Android Users Can Patch Critical Flaw

  /     /     /  
Publicated : 22/11/2024   Category : security


Android Users Can Patch Critical Flaw


ReKey app can be used to patch vulnerability that affects 99% of all Android smartphones and tablets, but requires rooting devices first.



9 Android Apps To Improve Security, Privacy (click image for larger view)
Android users can patch their devices against a critical, easily exploitable flaw in the mobile operating system thanks to a new patch developed not by handset makers or carriers, but by researchers from Northeastern Universitys System Security Lab and security firm Duo Security.
The two organizations Tuesday announced the release of ReKey, a free mobile app thats designed to patch the
Android master key vulnerability
thats present in an estimated 900 million devices that run Android and that could be exploited by attackers to take full control of a device. The app can be downloaded from a
dedicated ReKey website
or via
Google Play
.
But theres a caveat: the app works only on
rooted devices
.
This vulnerability can be used to replace legitimate apps on an Android device with malicious versions. Apps with many permissions -- like those from the phones manufacturer or the users service provider -- are at particular risk, said Trend Micro security researcher Jonathan Leopando in a
blog post
. Once on the device, they can behave in the way that any malicious app would, except the user would think they were a completely legitimate app. For example, a modified/Trojanized app for a bank would continue to work for the user, but the credentials would have been sent to an attacker.
[ Are Chrome users more comfortable with risk than Firefox users? Read
Chrome Users More Likely To Ignore Security Warnings
. ]
Bluebox Labs, which discovered the vulnerability, privately disclosed the flaw to Google in February, which quickly patched the bug in the Android Open Source Project (AOSP). Google is also now reportedly scanning apps that it distributes via Google Play for signs that theyve been weaponized to take advantage of the vulnerability. But aside from a handful of devices that were built to use the latest Android operating system, carriers and handset makers have yet to issue a related Android patch to their customers and subscribers. As a result, an estimated 99% of all Android devices could be exploited via the vulnerability.
The security of Android devices worldwide is paralyzed by the slow patching practices of mobile carriers and other parties in the Android ecosystem, said Jon Oberheide, CTO of Duo Security, in a statement. His firm, which provides two-factor authentication as a service, has
received funding
from the Defense Advanced Research Projects Agency (DARPA) for its X-Ray project, which last year found that
more than 50% of all Android devices
had unpatched vulnerabilities.
The likelihood of malicious attacks that exploit the master key vulnerability has lately increased. Thats because, in advance of a Bluebox Labs Aug. 1 presentation at the security conference Black Hat that promised to showcase the technical details of Android security bug 8219321, enterprising security researchers used the
non-technical presentation summary
to begin searching for the flaw. Ultimately, the bug was detailed about 10 days ago on the forums of
community-built Android firmware CyanogenMod
, and last week viaForensics mobile security engineer Pau Oliva posted proof-of-concept -- albeit harmless -- exploit code to Github.
How does ReKey patch the vulnerability and protect against related exploits? ReKey injects a small piece of code into the running Android framework. The code dynamically patches the ZipEntry and ZipFile classes to interpose on the vulnerable routines and thereby fix the root cause of the bugs, reads a FAQ on the ReKey website. In addition to fixing the bugs, ReKey installs a warning system that alerts the user when they attempt to install an APK that abuses the vulnerabilities -- referring to the Android app file format (APK).
As noted, however, the patch currently works only on rooted devices. To patch the vulnerabilities on your device, ReKey requires escalated privileges, reads the FAQ. Normal unprivileged applications on stock Android devices do not possess such privileges, hence the need for a rooted device with the Superuser (or similar) application.
While the researchers behind the project suggested that they would be able to build an app that would work on non-rooted devices, they said such functionality would require using an exploit, thus posing a public safety risk if attackers managed to reverse-engineer the exploit. That being said, if a weaponized exploit was observed being used publicly in the wild for nefarious purposes, that would change our calculus or whatever the phrase is these days, they said on the FAQ. Stay tuned.
While the patch addresses the vulnerability identified by Bluebox Labs, information security researchers at Android Security Squad in China announced last week in a
Chinese-language blog post
(
available in translation
) that theyd discovered a related flaw that could also be used to modify the original APK without modifying the checksum used to verify that the app hadnt been tampered with.
The attack works by tweaking the APKs filename to add an extra field, which is then used to feed up to 64 KB of arbitrary data to the app. As a result, attackers could repackage a legitimate app to include malware, without leaving any indication that the Android file was malicious. The researchers said the flaw relates to a problem with a Java-based signature-verification routine.
Google has reportedly patched the vulnerability in the AOSP. But how long will Android users have to
wait, yet again, for a fix
from their carriers or handset makers?
Added July 17:
Security firm Webroot said
that an updated version of its free antivirus product,
Webroot SecureAnywhere Mobile
, released Tuesday, now also blocks the master key vulnerability. Unlike ReKey, the Android app does so without requiring a device to be rooted.

Last News

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Android Users Can Patch Critical Flaw