1080*80 ad

Proton Patches Authenticator Bug Exposing TOTP Secrets in Logs

Proton Authenticator Security Flaw on Android: What It Means for Your 2FA and How to Stay Safe

Two-factor authentication (2FA) is a cornerstone of modern online security, acting as a crucial second line of defense for your most sensitive accounts. Authenticator apps that generate Time-based One-Time Passwords (TOTP) are a popular choice for implementing 2FA. However, a recently discovered vulnerability in the Android version of Proton Authenticator highlights that even tools designed for security require user vigilance.

A security flaw was identified and has since been patched, but it serves as a critical reminder about the importance of keeping your applications up to date. Here’s a breakdown of what happened, what it means for you, and the steps you should take to ensure your accounts remain secure.

Understanding the Vulnerability: A Leak in the Logs

The core of the issue was a logging error within the Proton Authenticator app for Android. When a user added a new account to the authenticator by scanning a QR code, the app would inadvertently save the underlying secret key—the very piece of data used to generate your unique 6-digit codes—to the device’s system log.

This system log, known on Android as logcat, is primarily a tool for developers to diagnose and debug app behavior. While it isn’t accessible to most apps, the danger arises from the possibility of another application on your device having the specific (and rare) permission to read these logs.

In essence, the “master key” for a new 2FA account was temporarily written to a file on the device where it should never have been present. This vulnerability did not affect users on iOS or those who added accounts manually without using the QR code scanner.

The Real-World Risk: How Could This Affect You?

The security risk, while requiring specific conditions, was significant. For an attacker to exploit this flaw, they would need to have you install a malicious application on your Android device. This malicious app would need to be granted permission to read system logs.

If these conditions were met, the attack could unfold as follows:

  1. You install a new app or service and go to set up 2FA.
  2. You use the vulnerable version of Proton Authenticator to scan the QR code.
  3. The authenticator app mistakenly writes the secret TOTP key to the system log.
  4. The malicious app, already on your phone, reads the system log and steals the secret key.

With this stolen key, an attacker could generate the exact same 2FA codes as your app, effectively giving them a duplicate key to your account. This would allow them to bypass 2FA protection on that specific service, potentially leading to an account takeover.

Swift Action and the Solution

Upon being notified of the vulnerability, the Proton team acted quickly to address the issue. The flaw has been completely resolved in the latest version of the application.

The fix was released in Proton Authenticator version 1.1.2 for Android. This updated version no longer logs the sensitive TOTP secret when adding a new account, closing the security loophole entirely.

Your Security Checklist: Steps to Take Right Now

While the vulnerability is patched, proactive steps are essential to ensure your accounts are protected, especially if you added any 2FA accounts recently using the Android app.

1. Update Immediately: The most critical step is to go to the Google Play Store and update your Proton Authenticator app to version 1.1.2 or newer. This prevents any future exposure.

2. For Maximum Security, Reset Your 2FA Keys: The patch prevents the bug from happening again, but it cannot retroactively secure keys that may have been exposed. If you added any accounts to Proton Authenticator on Android before updating the app, the safest course of action is to reset the 2FA on those services. This involves:
* Logging into the service in question (e.g., your Google, Microsoft, or social media account).
* Navigating to your security settings and disabling 2FA.
* Re-enabling 2FA and scanning the new QR code with your now-updated Proton Authenticator app.
This process generates a brand-new secret key, ensuring any previously exposed key is now useless.

3. Review Your App Permissions: This incident is a powerful reminder to be cautious about the apps you install and the permissions you grant them. Regularly review which apps have access to sensitive information on your device. Be particularly wary of apps requesting unusual permissions, such as access to system logs or accessibility services.

This event underscores a fundamental truth of cybersecurity: no software is perfect. Vulnerabilities can and do appear in even the most reputable applications. Your best defense is a combination of using trusted security tools and maintaining good digital hygiene—keeping software updated, being mindful of permissions, and taking swift action when security issues are disclosed.

Source: https://www.bleepingcomputer.com/news/security/proton-fixes-authenticator-bug-leaking-totp-secrets-in-logs/

900*80 ad

      1080*80 ad