Nexus users move right along.
Everyone else, read on and hope your mobe-maker fixes it
Four Qualcomm vulnerabilities grant malware writers total access to modern Android smartphones.
The flaws allow attackers to write malware that, when installed, offers them privilege escalation on Android Marshmallow and earlier versions of Google’s mobile OS.
The good news is that three of the four holes, disclosed at the DEF CON security conference, have been patched.
A fix for the remaining flaw will land shortly.
Owners of pure Android Nexus handsets are already patched, provided they accepted the over the air updates, but those operating other models will need to hope their largely unmotivated manufacturers will cop the cost of integrating the fixes into their own custom Android ROMs.
The Nexus 5X, 6 and 6P are affected, along with the Samsung S7 and S7 Edge, HTC 10 and One M9, and Blackphone 1 and 2.
Researchers say the attack can be woven into an app that would execute without requiring users to approve Android access permission checks.
Image: The Register.
“An attacker can exploit these vulnerabilities using a malicious app,” Check Point researchers say.
“Such an app would require no special permissions to take advantage of these vulnerabilities, alleviating any suspicion users may have when installing.”
The flaws affect Qualcomm chip software drivers installed at the point of manufacture, meaning updates must be pushed from the hardware company to phone vendors before it can flow to users.
“This situation highlights the inherent risks in the Android security model,” the team says.
“Critical security updates must pass through the entire supply chain before they can be made available to end users.”
The many millions of devices affected by various Android vulnerabilities is an often over-simplified metric; exploits usually need to be customised for different makes, models, and Android operating system versions in order for compromise to occur, and one simple app is not enough to own an entire ecosystem.
Square mobile security hacker Dino Dai Zovi told The Register earlier this year at Black Hat Asia that Android’s diverse and oft un-patched ecosystem is a strength, not a weakness.
“The ecosystem is such that it makes exploitation more difficult because it needs to be designed for [each device],” Dai Zovi said at the time. “[Android] security features like verify apps, and Google Play store application checks makes it a much safer system.”
Checkpoint’s attack dubbed Quadrooter could, with some skill applied, be baked into legitimate apps hosted on the Google Play store. Lazy hackers will gain less victims by circulating it as a third party apk app installation file which requires users to flick a switch to intentionally allow installation of external apps.
Users can check if their phones are vulnerable using Check Point’s free app.
Qualcomm has a 65 percent share in LTE chipsets. ®
Sponsored: 2016 Cyberthreat defense report