CVE-2018-6018
📋 TL;DR
CVE-2018-6018 is a vulnerability in Tinder's mobile apps where fixed HTTPS response sizes allowed attackers to infer private user actions (like swipes) by analyzing encrypted network traffic patterns. This affects Tinder iOS and Android app users on unsecured networks. The vulnerability exploits metadata leakage despite HTTPS encryption.
💻 Affected Systems
- Tinder iOS App
- Tinder Android App
📦 What is this software?
Tinder by Tinder
Tinder by Tinder
⚠️ Risk & Real-World Impact
Worst Case
Attackers on the same network could reconstruct complete user swipe patterns, infer sexual orientation, relationship status, and personal preferences without decrypting traffic.
Likely Case
Attackers on public Wi-Fi could monitor swipe patterns to infer user preferences and potentially identify specific users based on their activity patterns.
If Mitigated
With proper network segmentation and user awareness, impact is limited to theoretical risk with minimal practical exploitation.
🎯 Exploit Status
Exploitation requires network sniffing capability but no authentication or special privileges. Tools for traffic analysis are widely available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Tinder app updates released in January 2018
Vendor Advisory: https://www.checkmarx.com/2018/01/23/tinder-someone-may-watching-swipe-2/
Restart Required: Yes
Instructions:
1. Update Tinder app from official app store 2. Ensure app version is post-January 2018 3. Restart app after update
🔧 Temporary Workarounds
Use VPN on untrusted networks
allEncrypt all network traffic through VPN to prevent traffic analysis
Avoid public Wi-Fi for sensitive apps
allUse cellular data or trusted networks when using dating apps
🧯 If You Can't Patch
- Use VPN service on all untrusted networks to encrypt traffic end-to-end
- Disable automatic Wi-Fi connections and only use trusted, encrypted networks
🔍 How to Verify
Check if Vulnerable:
Check app version in settings - versions before January 2018 are vulnerable. Monitor network traffic for consistent response sizes to similar actions.
Check Version:
Check within app settings or app store for version information
Verify Fix Applied:
Update to latest Tinder version and verify response sizes vary for similar actions when monitoring encrypted traffic.
📡 Detection & Monitoring
Log Indicators:
- Unusual network traffic patterns from mobile devices
- Consistent packet sizes for different user actions
Network Indicators:
- Consistent HTTPS response sizes for different API endpoints
- Patterned network traffic from Tinder app
SIEM Query:
source="network_traffic" app="Tinder" packet_size_variance<10%
🔗 References
- https://www.checkmarx.com/2018/01/23/tinder-someone-may-watching-swipe-2/
- https://www.wired.com/story/tinder-lack-of-encryption-lets-strangers-spy-on-swipes/
- https://www.checkmarx.com/2018/01/23/tinder-someone-may-watching-swipe-2/
- https://www.wired.com/story/tinder-lack-of-encryption-lets-strangers-spy-on-swipes/