New 0-Day Flaw Affecting Most Android Phones Being Exploited in the Wild

DDE_Server

Level 22
Thread author
Verified
Top Poster
Well-known
Sep 5, 2017
1,173

android vulnerability

Another day, another revelation of a critical unpatched zero-day vulnerability, this time in the world's most widely used mobile operating system, Android.

What's more? The Android zero-day vulnerability has also been found to be exploited in the wild by the Israeli surveillance vendor NSO Group—infamous for selling zero-day exploits to governments—or one of its customers, to gain control of their targets' Android devices.

Discovered by Project Zero researcher Maddie Stone, the details and a proof-of-concept exploit for the high-severity security vulnerability, tracked as CVE-2019-2215, has been made public today—just seven days after reporting it to the Android security team.

The zero-day is a use-after-free vulnerability in the Android kernel's binder driver that can allow a local privileged attacker or an app to escalate their privileges to gain root access to a vulnerable device and potentially take full remote control of the device.

Vulnerable Android Devices

The vulnerability resides in versions of Android kernel released before April last year, a patch for which was included in the 4.14 LTS Linux kernel released in December 2017 but was only incorporated in AOSP Android kernel versions 3.18, 4.4 and 4.9.

Therefore, most Android devices manufactured and sold by a majority of vendors with the unpatched kernel are still vulnerable to this vulnerability even after having the latest Android updates, including below-listed popular smartphone models :

  • Pixel 1
  • Pixel 1 XL
  • Pixel 2
  • Pixel 2 XL
  • Huawei P20
  • Xiaomi Redmi 5A
  • Xiaomi Redmi Note 5
  • Xiaomi A1
  • Oppo A3
  • Moto Z3
  • Oreo LG phones
  • Samsung S7
  • Samsung S8
  • Samsung S9
To be noted, Pixel 3, 3 XL, and 3a devices running the latest Android kernels are not vulnerable to the issue.

Android Flaw Can Be Exploited Remotely

According to the researcher, since the issue is "accessible from inside the Chrome sandbox," the Android kernel zero-day vulnerability can also be exploited remotely by combining it with a separate Chrome rendering flaw.

"The bug is a local privilege escalation vulnerability that allows for a full compromise of a vulnerable device. If the exploit is delivered via the Web, it only needs to be paired with a renderer exploit, as this vulnerability is accessible through the sandbox," Stone says in the Chromium blog.

"I've attached a local exploit proof-of-concept to demonstrate how this bug can be used to gain arbitrary kernel read/write when running locally. It only requires the untrusted app code execution to exploit CVE-2019-2215. I've also attached a screenshot (success.png) of the POC running on a Pixel 2, running Android 10 with security patch level September 2019."
Patches to be Made Available Soon

Though Google will release a patch for this vulnerability in its October's Android Security Bulletin in the coming days and also notified OEMs, most affected devices would not likely receive the patch immediately, unlike Google Pixel 1 and 2.



"This issue is rated as High severity on Android and by itself requires installation of a malicious application for potential exploitation. Any other vectors, such as via web browser, require chaining with an additional exploit," the Android security team said in a statement.
"We have notified Android partners, and the patch is available on the Android Common Kernel. Pixel 3 and 3a devices are not vulnerable while Pixel 1 and 2 devices will be receiving updates for this issue as part of the October update."
Google's Project Zero division usually gives software developers a 90-day deadline to fix the issue in their affected products before going public with the details and PoC exploits, but in case of active exploits, the team goes public after seven days of privately being reported.

What's your take? Although this vulnerability is severe and can be used to gain root access to an Android device, users need not worry that much as the exploitation of such issues is mostly limited to targeted attack scenarios.

Nevertheless, it's always a good idea to avoid downloading and installing apps from third-party app stores and any unnecessary apps, even from the Google Play Store.
 
9

93803123

Android is crazy insecure, but people keep gobbling up $1,000+ Android devices. Not to mention the complete Android rip-off of only 2 years of updates (from the official date of release - which could be an announcement as opposed to the ship date which might come weeks or months after the announcement).

No one that spends more than $150 on an Android should feel too good about their 2 year investment.
 

Threadripper

Level 9
Verified
Well-known
Feb 24, 2019
408
Android is crazy insecure, but people keep gobbling up $1,000+ Android devices. Not to mention the complete Android rip-off of only 2 years of updates (from the official date of release - which could be an announcement as opposed to the ship date which might come weeks or months after the announcement).

No one that spends more than $150 on an Android should feel too good about their 2 year investment.
I've seen some get even less than a year. Even those that get 2 years of updates rarely get monthly security patches monthly, more like every few months. When updates are lost value drops like crazy, the Galaxy S7 is a perfect example.
 
9

93803123

I've seen some get even less than a year. Even those that get 2 years of updates rarely get monthly security patches monthly, more like every few months. When updates are lost value drops like crazy, the Galaxy S7 is a perfect example.

Waiting for a Linux phone. Hopefully Librem5 will turn out to be a decent phone in a year or two.

The other option is an Apple phone.
 

Threadripper

Level 9
Verified
Well-known
Feb 24, 2019
408
Waiting for a Linux phone. Hopefully Librem5 will turn out to be a decent phone in a year or two.

The other option is an Apple phone.
I made the switch from Android to iOS around 6 months back, my first iPhone and I'm loving it. Sure, it's not perfect, but I know that in 3 years time I can still sell my phone for a number in the hundreds, I'll get updates for WAY longer than 3 years and privacy and security is significantly better. Perfect? No. But still much better with no sacrifice of apps I can download, services I can use, etc.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top