CVE-2020-26230

7.4 HIGH

📋 TL;DR

This vulnerability in Spain's Radar COVID app allowed network observers to identify users who tested positive for COVID-19 by monitoring app traffic. Only positive users uploaded data to servers, creating a unique traffic pattern that could be detected by ISPs, mobile operators, or anyone on the same network. The vulnerability also enabled potential de-anonymization by correlating this traffic with other identifiable user information.

💻 Affected Systems

Products:
  • Radar COVID (Spain's official COVID-19 exposure notification app)
Versions: iOS versions before 1.0.8/1.1.0, Android versions before 1.0.7/1.1.0, Backend versions before 1.1.2-RELEASE
Operating Systems: iOS, Android
Default Config Vulnerable: ⚠️ Yes
Notes: All installations using affected versions were vulnerable by default. The vulnerability was inherent to the app's traffic pattern design.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers identify COVID-positive individuals and link them to personal identities, enabling targeted harassment, discrimination, or social engineering attacks based on health status.

🟠

Likely Case

Network operators or public WiFi providers detect which users are COVID-positive, potentially violating privacy but without personal identification.

🟢

If Mitigated

With dummy traffic implementation, all users generate similar traffic patterns, making positive users indistinguishable from others.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network monitoring capability but no authentication or special tools. Any on-path observer can detect the traffic pattern difference between positive and negative users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: iOS: 1.0.8 (uniform distribution) or 1.1.0 (exponential distribution), Android: 1.0.7 (uniform distribution) or 1.1.0 (exponential distribution), Backend: 1.1.2-RELEASE

Vendor Advisory: https://github.com/RadarCOVID/radar-covid-android/security/advisories

Restart Required: Yes

Instructions:

1. Update Radar COVID app from official app stores (Apple App Store or Google Play Store). 2. Ensure app restarts after update. 3. Verify backend systems are updated to version 1.1.2-RELEASE or later.

🔧 Temporary Workarounds

Disable app network usage

android

Prevent the app from communicating with servers to avoid traffic pattern detection

Settings > Apps > Radar COVID > Mobile data & Wi-Fi > Disable background data

Use VPN with encrypted traffic

all

Route all app traffic through a trusted VPN to obscure traffic patterns from local network observers

🧯 If You Can't Patch

  • Uninstall the vulnerable app version and use alternative exposure notification methods
  • Only use the app on trusted, private networks and avoid public WiFi or cellular data

🔍 How to Verify

Check if Vulnerable:

Check app version in settings: iOS: Settings > Radar COVID > Version; Android: Settings > Apps > Radar COVID > App info > Version

Check Version:

iOS: No command line; check in app settings. Android: adb shell dumpsys package es.gob.radarcovid | grep versionName

Verify Fix Applied:

Verify app version is at least iOS 1.0.8/1.1.0 or Android 1.0.7/1.1.0. Monitor network traffic to confirm both positive and negative users generate similar traffic patterns.

📡 Detection & Monitoring

Log Indicators:

  • Unusual traffic patterns where only specific users upload TEK data to Radar COVID servers
  • Correlation between user identity logs and Radar COVID server upload timestamps

Network Indicators:

  • HTTP/HTTPS traffic to Radar COVID backend servers from mobile devices
  • Pattern where only certain devices upload data while others don't
  • Traffic analysis showing identifiable upload patterns

SIEM Query:

source="network_traffic" dest_ip="radarcovid_backend_servers" | stats count by src_ip | where count > threshold

🔗 References

📤 Share & Export