Security News Android Vulnerability Affects 2.8 Million Devices

Exterminator

Level 85
Thread author
Verified
Top Poster
Well-known
Oct 23, 2012
12,527
48,602
8,380
USA
A new Android vulnerability, estimated to impact 2.8 million devices worldwide at its peak, has been uncovered by security ratings firm BitSight.

The vulnerability, which affects devices out of the box, involves Android devices (including BLU Studio G from Best Buy) and an over-the-air (OTA) update mechanism associated with the software company, Ragentek Group, in China. Certain mobile phones are this vulnerable to man-in-the-middle attacks, allowing adversaries to execute arbitrary commands as a privileged user—such as extracting information or remotely wiping the device—and making it possible to gain access to other systems on a corporate network and steal sensitive information.

Many of these devices sit unknowingly on enterprise corporate networks.

According to BitSight, transactions from the binary to the third-party endpoint occur over an unencrypted channel, which not only exposes user-specific information during these communications, but would allow an adversary to issue commands supported by the protocol. One of these commands allows for the execution of system commands.

“This OTA binary was distributed with a set of domains preconfigured in the software,” the company said. “Only one of these domains was registered at the time of the discovery of this issue. If an adversary had noticed this, and registered these two domains, they would’ve instantly had access to perform arbitrary attacks on almost 3,000,000 devices without the need to perform a man-in-the-middle attack.”

BitSight’s AnubisNetworks now controls these two extraneous domains to prevent such an attack from occurring in the future, it said.

Still, the impact is significant. “We have observed over 2.8 million distinct devices, across roughly 55 reported device models, which have checked into our sinkholes since we registered the extraneous domains,” the company said. “In some cases, we have not been [able] to translate the provided device model into a reference to the real-world device. Thus, there could be additional device models affected.”
 
My old Samsung S3 is not updated from years and it is a repository of vulnerability.
Normal situation because vendors are pushing the user towards the purchase of a new smartphone.
So there are two options: I keep my old S3 with its old vulnerabilities or I purchase a new smartphone with new flaws...:D:rolleyes:
 
Usually those vulnerabilities are already common and Google notified it to patch for latest update.

The problem goes from 3rd party manufacturer where they only deliver updates from specific fixes rather the Android overall patches.
 
  • Like
Reactions: Fritz
Hopefully they push out an update- I am 99% sure they can push out some security updates using Google Play Services in the background. I try to install Android software/firmware upgrades through Samsung SmartSwitch on my PC than OTA. You can backup and restore the contents, get a full update that it flashes (so there is less risk of a corrupted file IMHO and I am pretty sure it wipes the device instead of just patches it OTA. Another layer of reliability and security for me. Consider using it - just follow the instructions!

Samsung Smart Switch