Researchers discover vulnerability in Samsung's Knox BYOD software
The vulnerability was reported Tuesday by The Wall Street Journal, based on a report by Israel’s Ben-Gurion University of the Negev. Samsung officials told the Journal that the vulnerability was found in developer phones that weren’t “fully loaded with the extra software that a corporate client would use in conjunction with Knox,” the paper reported. So far, the Knox vulnerability has only been discovered on the Galaxy S4.
Like third-party apps such as NitroDesk’s TouchDown HD, Knox was developed with an eye for the so-called “BYOD” movement, where personal smartphones and other devices are allowed onto corporate networks. The problem is that those same corporate network administrators want to ensure that sensitive corporate data—which can include email, contacts, and calendar information—doesn’t wander outside the corporate firewall, intentionally or not.
Samsung’s Knox creates an encrypted, virtualized space within the smartphone, so that apps such as email, phone, contacts, and others can be loaded securely. Data can be prevented, by policy, by being moved outside of Knox.
The vulnerability that the researchers found allowed corporate data to leak through the Know secure container, the researchers reported. They also suggested that code could be injected from outside the container, into it, and run wild on the corporate network.
Separating corporate data from personal data has been one of the selling points of the BlackBerry 10 OS. Per-app VPN technology has also been built into Apple’s iOS 7, which has its own secure workspace apps, including Divide (which is also available for Android, at $5 per user per month). TouchDown for Android costs a flat fee of $20.
0 comments: