Now experts from IBM have discovered another critical bug in the Google Android OS that impacts more than 55 percent of all the mobile devices.
The researchers explained that the new bug, coded as CVE-2015-3825, is a privilege escalation vulnerability in the Android platform that could be exploited to allow “a malicious app with no privileges, the ability to become a ‘super app’ and help the cybercriminals own the device.”
The flaw, dubbed Android serialization vulnerability, affects Android versions 4.3 and above, including the latest release Android M.
The vulnerability resides in the Android OS component called OpenSSLX509Certificate, the attackers can exploit it to compromise the system_server process and gain powerful system-level access to the mobile device.
The researchers published a video proof-of-concept for the exploitation of the flaw, in the video the attacker exploits the flaw using a malicious app by replacing the legitimate Facebook app to steal victim’s credentials.
When the victim runs the app, it downloads additional code to replace the existing app with a malicious code, including an exploit used to escalate permissions using the vulnerability.
Security experts from IBM also discovered other vulnerabilities in a series of third-party Android Software Development Kits (SDKs) that could allow attackers to execute remote arbitrary code from the apps that use these SDKs.
The IBM has already reported the flaws to Google, more information is available in a detailed analysis presented in a paper published by the researchers.
(Security Affairs – Deserialization flaw, macros)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.