Alexa flaws may have let hackers steal voice history
Certain Amazon and Alexa subdomains were vulnerable to cross-origin resource sharing and cross-site scripting attacks


Some Amazon and Alexa subdomains were vulnerable to attack, meaning hackers could have accessed users' voice history on Alexa devices, install third-party apps, and access personal information.
By exploiting cross-origin resource sharing (CORS) misconfiguration, as well as cross-site scripting (XSS) to get a unique CSRF token, hackers were able to perform actions on Alexa devices on a victims’ behalf.
These flaws, which were reported in June and subsequently fixed, could have allowed an attacker to install third-party apps (or skills), get a list of installed apps, remove an installed app, get a victim’s voice history, and access their personal information.
When testing with the Alexa mobile application, researchers with Check Point Research noticed an SSL pinning mechanism which prevented them from inspecting traffic. This was bypassed using a universal unpinning script, with researchers viewing traffic in plain text.
“While looking at the traffic of the application, we found that several requests made by the app had misconfigured the CORS policy, ultimately allowing the sending of Ajax requests from any other Amazon sub-domain,” said security researchers Dikla Barda, Roman Zaikin and Yaara Shriki.
“This could potentially have allowed attackers with code-injection capabilities on one Amazon subdomain to perform a cross-domain attack on another Amazon subdomain.”
One of the requests returned a list of all installed skills on the Alexa device, and also returned the CSRF token. This token was then used to perform actions, such as installing and enabling new skills remotely.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
RELATED RESOURCE
The researchers needed to exploit the XSS vulnerability in one of Amazon’s sub-domains for the attack to succeed and use the victim’s identification cookies. From there, they could exploit the CSRF attack and CORS misconfiguration, and perform actions on behalf of the victim on their Alexa account.
Alarmingly, the attack could’ve been conducted using a single malicious link that would direct a victim to the Amazon website, where the attacker had code-injection capabilities. From there, they could conduct various actions including stealing voice history and personal data.
“The security of our devices is a top priority, and we appreciate the work of independent researchers like Check Point who bring potential issues to us," an Amazon spokesperson said.
"We fixed this issue soon after it was brought to our attention, and we continue to further strengthen our systems. We are not aware of any cases of this vulnerability being used against our customers or of any customer information being exposed."

Keumars Afifi-Sabet is a writer and editor that specialises in public sector, cyber security, and cloud computing. He first joined ITPro as a staff writer in April 2018 and eventually became its Features Editor. Although a regular contributor to other tech sites in the past, these days you will find Keumars on LiveScience, where he runs its Technology section.
-
The UK government wants quantum technology out of the lab and in the hands of enterprises
News The UK government has unveiled plans to invest £121 million in quantum computing projects in an effort to drive real-world applications and adoption rates.
By Emma Woollacott Published
-
Netgear WBE710 review
Reviews The compact WBE710 delivers great cloud management features and a good turn of Wi-Fi 7 speed – but it does have a premium price tag
By Dave Mitchell Published
-
Hackers are targeting Ivanti VPN users again – here’s what you need to know
News Ivanti has re-patched a security flaw in its Connect Secure VPN appliances that's been exploited by a China-linked espionage group since at least the middle of March.
By Emma Woollacott Published
-
Broadcom issues urgent alert over three VMware zero-days
News The firm says it has information to suggest all three are being exploited in the wild
By Solomon Klappholz Published
-
Nakivo backup flaw still present on some systems months after firms’ ‘silent patch’, researchers claim
News Over 200 vulnerable Nakivo backup instances have been identified months after the firm silently patched a security flaw.
By Solomon Klappholz Published
-
Everything you need to know about the Microsoft Power Pages vulnerability
News A severe Microsoft Power Pages vulnerability has been fixed after cyber criminals were found to have been exploiting unpatched systems in the wild.
By Solomon Klappholz Published
-
Vulnerability management complexity is leaving enterprises at serious risk
News Fragmented data and siloed processes mean remediation is taking too long
By Emma Woollacott Published
-
Hackers are turning Amazon S3 bucket encryption against customers in new ransomware campaign – and they’ve already claimed two victims
News Attackers are using AWS’ server-side encryption to conduct ransomware attacks
By Solomon Klappholz Published
-
A critical Ivanti flaw is being exploited in the wild – here’s what you need to know
News Cyber criminals are actively exploiting a critical RCE flaw affecting Ivanti Connect Secure appliances
By Solomon Klappholz Published
-
Researchers claim an AMD security flaw could let hackers access encrypted data
News Using only a $10 test rig, researchers were able to pull off the badRAM attack
By Solomon Klappholz Published