Home SecurityOS Security Zero-day vulnerability gives attackers full control of Android phones

Zero-day vulnerability gives attackers full control of Android phones

by ethhack

Attackers are reportedly exploiting an unpatched vulnerability to take control of Android devices and potentially deliver spyware. The flaw affects phones models from multiple manufacturers including Google, Samsung, Huawei, LG and Xiaomi.

The vulnerability is a use-after-free memory condition in the Android Binder component that can result in privilege escalation. The flaw was patched without a CVE identifier in Dec. 2017 in the Linux 4.14 LTS kernel, the Android Open Source Project’s (AOSP) 3.18 kernel, the AOSP 4.4 kernel and AOSP 4.9 kernel.

AOSP maintains the reference Android code, but individual device manufacturers, including Google itself, do not use it directly. They maintain separate firmware trees for their devices, which often run different kernel versions. This means every time a vulnerability is fixed in AOSP, device makers have to import the patch and apply it to their customized firmware code; and this particular one appears to have been missed.

According to a report by Google Project Zero researcher Maddie Stone, Google’s Pixel 2 with Android 9 and Android 10 preview is vulnerable and so are the Huawei P20, Xiaomi Redmi 5A, Xiaomi Redmi Note 5, Xiaomi A1, Oppo A3, Moto Z3, Samsung S7, S8 and S9, as well as LG phones that run Android Oreo.

In a message on Twitter, Stone clarified that those are the devices for which she confirmed the flaw via source code review, but she noted that “most Android devices pre-Fall 2018 are affected.”

Like most privilege escalation issues, this vulnerability can be exploited by a malicious application installed on the device to gain root privileges — full control of the device. This allows an escape from the application sandbox, which is fundamental to the Android security model. In addition, according to Stone, it can also be targeted directly from the Web if it’s chained with a browser renderer exploit, because the flaw is also accessible through the browser sandbox.

Copyright © 2019 IDG Communications, Inc.



Source link

Related Articles

Leave a Comment