{"id":11923,"date":"2017-06-19T07:50:43","date_gmt":"2017-06-19T12:50:43","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=11923"},"modified":"2017-07-11T11:59:26","modified_gmt":"2017-07-11T16:59:26","slug":"oneplus-security-problems","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/oneplus-security-problems\/","title":{"rendered":"Using a OnePlus? Be Aware of These Security Vulnerabilities"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">While OnePlus fans eagerly await the Chinese phone\u2019s release, they might want to take a look at a few of the phone\u2019s flaws as well. Recently, security experts have uncovered <\/span><a href=\"http:\/\/thehackernews.com\/2017\/05\/oneplus-mobile-vulnerabilities.html\"><span style=\"font-weight: 400;\">major vulnerabilities in the OnePlus<\/span><\/a><span style=\"font-weight: 400;\"> One, X, 2, 3 and 3T that pose a major risk to OnePlus users. If you\u2019re interested in buying a OnePlus, be sure to download DFNDR on your new phone and to run Full Virus Scans regularly to keep your device secure against hackers that are taking advantage of the recently discovered vulnerabilities. In the meantime, don\u2019t neglect the security of your current smartphone. Click here to run a scan now:<\/span><\/p>\n<p><center><a href=\"psafe:\/\/launch\/antivirus_quick\" rel=\"attachment wp-att-9829\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-9829\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1-300x67.jpg\" alt=\"run-security-scan\" width=\"300\" height=\"67\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1-300x67.jpg 300w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1.jpg 353w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/center><span style=\"font-weight: 400;\">As consumers anticipate the arrival of the OnePlus 5 on June 20th, speculation about the newest smartphone\u2019s updated features abound. Similar to its smartphone predecessors, the OnePlus 5 is anticipated to share a 5.5-inch AMOLED display with curved sides. The phone will rely on the Snapdragon 835 processor and it is rumored to have a 3,600mAH battery with faster charging.<\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/5-safest-apps-live-streaming\/\"><b>Here Are the 5 Safest Apps for Live Streaming<\/b><\/a><\/p>\n<p><b>OnePlus Updates<\/b><\/p>\n<p><span style=\"font-weight: 400;\">OnePlus manufacturers are still sending smartphone users operating system updates and security patches over unencrypted channels. When these updates are sent through insecure channels, remote hackers are able to perform man-in-the-middle (MitM) attacks. This flaw alone is not enough to allow malicious updates to reach phones. However, when combined with other security loopholes, it allows cyber attacks to override the digital signature associated with legitimate updates.<\/span><\/p>\n<p><b>OnePlus Downgrade Attacks<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Unlike Android devices which contain code that prohibits smartphone users from downgrading their operating system, the OnePlus contains no such checks. Due to this oversight, hackers are able to remotely downgrade the phone\u2019s operating system to an earlier version which contains vulnerabilities addressed by later OS upgrades.<\/span><\/p>\n<p><b>OxygenOS and Hydrogen OS Attack<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The firmware of OxygenOS and Hydrogen OS for the OnePlus both rely on the same over-the-air verification keys. Due to this oversight, remote hackers are able to replace any version of the Oxygen operating system with any version of the Hydrogen operating system, according to security experts Roee Hay and Sagi Kedmi, who uncovered the security loopholes.<\/span><\/p>\n<p><b>OnePlus One and OnePlus X OTA<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Similar to the two flaws above, this crossover attack targets only the OnePlus X and the OnePlus One. In the case of this particular flaw, an MitM attacker can go a step further and replace the Hydrogen or Oxygen OS designed specifically for the OnePlus X phone with the version intended for OnePlus One phones. This attack is made possible because both versions share the same over-the-air verification keys as well as the same ro.build.product system property. The seriousness of this particular vulnerability should not be taken lightly, as it may render the device unusable until the phone has gone through a factory reset. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The OnePlus phone might be poised to become a major competitor in the smartphone industry, but only if it can address these major security flaws.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[301,303,308,312,249,161,4154],"class_list":["post-11923","post","type-post","status-publish","format-standard","hentry","category-security","tag-app2","tag-app3","tag-app6","tag-app8","tag-security","tag-virus","tag-vulnerable"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/11923","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=11923"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/11923\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=11923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=11923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=11923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}