QR code security vulnerability found with Google Glass

Jul 18, 2013 by Bob Yirka weblog

Engineers at Lookout Mobile Security have discovered a previously unknown security vulnerability with Google's project Glass wearable headset. Marc Rogers reports on the company's web site that engineers found that when pictures were taken of printed QR codes, the device could be routed to a hostile Wi-Fi access point, which in turn allowed for monitoring and capture of data flow to and from the device. They also found they were able to divert the device to a web page that allowed for taking advantage of a previously known Android vulnerability.

Google Glass, Google's augmented reality headset runs Android, and because of that is able to run many of the same apps as smartphones, one of which allows for reading, recognizing and responding to QR codes. Such codes have been designed for that very purpose. In testing the feature with a Glass device, the engineers at Lookout Mobile Security found that they could cause the device to connect to the Internet using a previously rigged Wi-Fi hotspot. In so doing, they found they were able to monitor traffic between the device and the Internet, picking up message content and images that were transferred. They also found that they could cause the device to be routed to a web page they'd set up that allowed them to take control of the device using a previously known Android vulnerability. That allowed them to read messages stored on the device, control the camera and perform any other phone function.

Rogers told the press that Google was notified of the vulnerability on May 16th and that the company has taken steps to head off the problem. A subsequent software update by Google shows that code has been amended to prevent the automatic relocation of a Wi-Fi hotspot when reading a QR code. Users are now asked if they wish to switch over.

This video is not supported by your browser at this time.

In response to publication of the discovery of the vulnerability, Google representatives reminded the press that Glass is still in a testing phase. Giving demo units to select users allows for finding and fixing vulnerabilities, they noted, as well as for spotting bugs or user issues before the device is made available to the general public.

Explore further: Thanksgiving travel woes? There's an app for that

Related Stories

Atheer Labs demos 3-D virtual object-manipulation goggles

Jul 01, 2013

(Phys.org) —Atheer Labs has announced the development of a new type of technology that allows for creating and manipulating virtual three-dimensional objects via goggles or by other types of devices. Calling ...

Recommended for you

Thanksgiving travel woes? There's an app for that

Nov 26, 2014

Traveling by plane, train or automobile can be a headache. Mixing in Thanksgiving can make it a throbbing migraine. Technology provides some pain relief in the form of apps to let you know which roads are ...

Singapore moves to regulate taxi booking apps

Nov 21, 2014

Singapore on Friday announced new rules for mobile taxi booking apps, including US-based Uber, in the latest move by governments around the world to regulate the increasingly popular services.

User comments : 3

Adjust slider to filter visible comments by rank

Display comments: newest first

fmfbrestel
3 / 5 (2) Jul 18, 2013
I can hardly believe that a bug in a beta product which had already been fixed is newsworthy.

If your looking for a few scoops, you can head over to the chrome releases blog and get details of all sorts of security bugs found and fixed. They publish a list every few weeks, and many more people (by orders of magnitude) are effected by chrome bugs.

/sarcasm
baudrunner
1 / 5 (1) Jul 18, 2013
For that matter, why should cell phones that read those QR codes be any safer?
kochevnik
2.3 / 5 (3) Jul 18, 2013
Another java exploit? Really???

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.