Americans should be deeply troubled by WikiLeaks breach — Central Intelligence Agency warns
"While our initial analysis indicates that numerous issues leaked today were already patched in the latest OS, we will continue work to rapidly address any identified vulnerabilities", the company said in a press statement late Tuesday.
President Donald Trump believed changes were needed to safeguard secrets at the Central Intelligence Agency and has "grave concern" about the release of classified materials, White House press secretary Sean Spicer said. According to the agency, the American public should be "deeply troubled by any Wikileaks disclosure created to damage the Intelligence Community's ability to protect America against terrorists and other adversaries".
It also said that its "initial analysis" indicated that numerous holes mentioned in the files, which were created between 2014 and 2016, had already been plugged in the latest updates to its operating system.
Apple's statement was the most detailed, saying it had already addressed some of the vulnerabilities.
"The list seems to be limited to Android 2.2 to 4.4.4 - we are on Android 7.1.1 now", said Sawyer.
Google, which makes the Android software for smartphones, could not be reached for comment.
Will Strafach, an iOS security researcher, said that "essentially, there is nothing" in the documents that point to working vulnerabilities of iOS 10 and later. Eighty percent of its users have upgraded to the latest version, Apple noted.
"Protecting consumers' privacy and the security of our devices is a top priority at Samsung", it said.
Linux, the open-source operating system, was also listed in the cache of documents.
Numerous files released were not classified and some pointed to common web utilities or "how to " s on installing software and operating systems.
Cisco, which manufactures some of the affected routers, told The Wall Street Journal that it would need more information about the exploits before it could work on fixing them.
"In the computer security world, it is widely known that unknown vulnerabilities in products do exist and that there is potential for these vulnerabilities to be exploited to compromise systems", Kirda said.
Some smartphone attacks developed by the CIA allow the agency to bypass the encryption in WhatsApp, Confide, and other apps by collecting audio and message traffic before encryption is applied, according to the WikiLeaks analysis. One of the more high-profile examples came when the Federal Bureau of Investigation reportedly purchased a software vulnerability in order to access the iPhone of a dead terrorist involved in last year's massacre at San Bernardino.
Avira, another antivirus maker, said it fixed a "minor vulnerability" within hours of the documents' release.
The CIA refuses to comment on the authenticity of leaks, but so far few doubt that the documents are real, and that they represent further damage to customer's trust in major tech giants.