Flaw in Android's Backup mechanism, inject mal code

Status
Not open for further replies.

Ink

Administrator
Thread author
Verified
Jan 8, 2011
22,318
2
55,055
8,379
A flaw (CVE-2014-7952) in Android's backup/restore mechanism can be exploited by knowledgeable developers to "respawn" malicious apps on phones, and make them gain top-level access and potentially dangerous permissions that they didn't have before.

[...]

The backup mechanism works through the Android Debug Bridge utility, so users who employ it for creating and restoring backups are in danger.

The researchers have shared the bug with the Android security team in July 2014, but it has still not been fixed.

It will be, though, in time. A Google spokesperson told Eduard Kovacs that it's low on their list of priorities, and explained why: “This issue does not affect Android users during typical device operation, as it requires that the use of a developer-only capability that is not enabled by default and is not frequently used. Exploitation also requires that users install a potentially harmful application."

Nevertheless, the researchers have decided that sharing this information with the world is important to keep users safe, and so they did. More information and PoC code can be found [at source].
 
I'm not totally at risk, because from the first place; if you are aware on programs you install then that worst case scenario is lifted only.

+ Message and calls purpose will range to zero infection rate.
 
The thing that has worried me more is not the fact of being at risk, but why this flaw is known by 2014 and has not yet been fixed.
 
Status
Not open for further replies.

You may also like...