Marriott’s already been in hot water as of late, thanks to its decision to block personal Wi-Fi hotspots, a decision that led to an FCC fine of $600,000. Now, Marriott finds itself in even deeper hot water as a software developer discovered a vulnerability in its Android app, which reportedly left credit card information open for hackers to nab for years.
According to Randy Westergren, who is the software developer in question, he discovered the vulnerability after he logged into the app using only his Membership ID number. After doing so, he realized the app made a request to fetch reservations, even though he had none. He discovered that the app was fetching reservations through unauthenticated requests, which means he could type in a different Membership ID and send it to the server. By doing so, Westergren could find out a customer’s reservation, the hotel where they will be staying at, and the check-in time.
Once he had this information, Westergren could easily log into Marriott’s website with it, since the site only requires a last name and reservation number to log in. Doing so granted Westergren the ability to cancel planned trips and obtain addresses, credit card numbers, and customer information. Granted, only the last four digits of their credit cards would be revealed, but that would be more than plenty for hackers to work with.
Thankfully, according to Westergren, Marriott fixed the issue a day after his report saw the light of day. We’ve yet to read or receive any reports of compromised accounts, so if you frequently use the Marriott app, your information should be safe. Even so, thinking about how the app first launched back in 2011 with this vulnerability doesn’t exactly make anyone very happy, to say the least.
- ‘Fortnite’ security flaw let hackers spy on players through microphones
- A flaw in e-ticket systems could mean a hacker can print your boarding pass
- A security flaw leaves Ring doorbells and cameras vulnerable to spying
- Internet-connected Mr. Coffee machines have security vulnerability, McAfee says
- Check your ports! Researchers find scary vulnerability in Thunderbolt accessories