The Nothing Telephone (2) has stellar software program by way of the person expertise, however the firm is beginning to develop a little bit of a observe document round worrying safety issues, with the newest instance coming from the corporate’s CMF sub-brand.
CMF is part of Nothing’s model which is targeted on delivering very low-cost merchandise, together with a $69 smartwatch. That watch connects by way of an app that’s used for setup and a few controls, however that app had a worrying safety drawback behind the scenes.
As noticed by 9to5Google contributor Dylan Roussel and detailed in a thread on Twitter/Xthe CMF Watch app has partially fastened a safety vulnerability that might expose person e-mail addresses and passwords.
The app itself, as Dylan initially found, was developed with the assistance of a separate firm, “Jingxun.” That in itself isn’t actually a difficulty, however the vulnerability laid a bit deeper throughout the app. As Dylan explains, the CMF Watch app requires customers to create an account with an e-mail deal with and a password, and the app then encrypts that information, which is an effective factor. Nonetheless, the app additionally left the decryption methodology for that information obtainable within the app, that means it wouldn’t take a lot for a malicious social gathering to entry that delicate data.
Successfully, it made the encryption virtually ineffective.
9to5Google assisted Dylan in reporting the problem to Nothing in September as, on the time, Nothing had no direct level of contact for safety/privateness vulnerabilities.
The corporate has since partially fastened the issue, as within the newest variations of the app the encryption methodology for the password has been up to date, although the e-mail deal with is technically nonetheless in danger.
Chatting with 9to5Google this week, Nothing says that it’s “at the moment working” to repair the remaining points, and reiterated that the preliminary problem was fastened. Extra importantly, Nothing has since opened up a degree of contact for safety vulnerabilities.
CMF takes privateness points very significantly and the workforce is investigating safety issues concerning the Watch app. We rectified preliminary credential issues earlier within the yr and are at the moment working to resolve the problems raised. As quickly as this subsequent repair is full, we are going to roll out an OTA replace to all CMF Watch Professional customers. Safety experiences can now be extra simply submitted by way of https://intl.cmf.tech/pages/vulnerability-report.
Notably, not solely is a vulnerability level of contact obtainable for CMF, but additionally for Nothing itself.
Whereas this problem wasn’t almost as impactful because the Nothing Chats/Sunbird points from November, it exhibits a worrying pattern with Nothing as, not less than twice now, the corporate’s companions have left gaps in safety that Nothing itself most likely ought to have been capable of determine. However, on the very least, the corporate appears to be pushing issues in the suitable course.
Extra on Nothing:
FTC: We use earnings incomes auto affiliate hyperlinks. Extra.

