ero-day vulnerability gives attackers full control of Android phones
Attackers are reportedly exploiting an unpatched vulnerability avg.com/activation to take control of Android devices and potentially deliver spyware avg internet security. The flaw affects phones models from avg.com/retail multiple manufacturers including Google, Samsung, Huawei, LG and Xiaomi.
The vulnerability is a use-after-free memory condition avg.com/activation in the Android Binder component that Install Avg With License Number activation can result in privilege escalation. The flaw was patched without a CVE identifier in Dec. 2017 in the Linux 4.14 LTS kernel, the Android Open Source Project’s (AOSP) 3.18 kernel, the AOSP 4.4 kernel and AOSP 4.9 kernel.
AOSP maintains the reference Android code, but individual device manufacturers, including Google itself, do not use it directly. They maintain separate firmware trees for their devices, which often run different kernel versions. This means every time a vulnerability is fixed in AOSP, device makers have avg internet security to import the patch and apply it to their avg.com/retail customized firmware code; and this particular one appears to have been missed.
According to a report by Google Project Zero researcher Maddie Stone, Google’s Pixel 2 with Android 9 and Android 10 preview is vulnerable and so are the Huawei P20, Xiaomi Redmi 5A, Xiaomi Redmi Note 5, Xiaomi A1, Oppo A3, Moto Z3, Samsung S7, S8 and S9, as well as LG phones that run Android Oreo.
In Stone clarified that those are the devices avg.com/activation for which she confirmed the flaw via source code Install Avg With License Number activation review, but she noted that “most Android devices pre-Fall 2018 are affected.”
Like most privilege escalation issues, this vulnerability can be exploited by a malicious application installed on the device avg internet security to gain root privileges -- full control of the device. This allows an escape from the application sandbox, which is fundamental Install Avg With License Number activation to the Android security model. In addition, according to Stone, it can also be targeted directly from the Web if it’s chained with a browser renderer exploit, because the flaw is also avg.com/activation accessible through the browser sandbox.
The Android project has shared the necessary information with the affected vendors and the patch is already available avg.com/retail , so now it’s up to them to integrate it into their firmware and release updates for affected devices. Google plans to fix the issue for Pixel 1 and 2 in this month’s upcoming update. Pixel 3 and 3a are not vulnerable.
Evidence of exploitation in the wild
While investigating the flaw, Install Avg With License Number activation Stone received technical details from Google's Threat Analysis Group (TAG), as well as external parties avg internet security about an Android exploit that is “allegedly being used or sold by the NSO Group” and whose technical details match this privilege escalation flaw.
Comments
Post a Comment