Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

8/8/2016
02:18 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Newly Announced Chipset Vuln Affects 900 Million Android Devices

Check Point Research Team details four vulnerabilities that can easily lead to full privilege escalation.

Over 900 million Android smartphones and tablets are at risk of a full device compromise due to a dangerous grouping of vulnerabilities found and discussed at length at Defcon yesterday by researchers with Check Point Research Team. Dubbed the QuadRooter vulnerabilities, each of the foursome uncovered by these researchers enables attackers to trigger privilege escalation and eventually achieve root in affected devices.

All four vulnerabilities are hidden in different software drivers control communication between hardware components developed in Qualcomm chipsets for these devices. They're found in four different modules: the inter-process communication router module, a shared memory feature, and two different graphics modules. They're folded directly into the Android operating system developed for each original equipment manufacturer (OEM) that uses these chipsets within their devices, including Samsung, HTC, Motorola and LG, among many others.

"An attacker can exploit these vulnerabilities using a malicious app," wrote Check Point researchers in a report on the vulnerabilities. "These apps require no special permissions to take advantage of these vulnerabilities, alleviating any suspicion users may have when installing."

 First disclosed to Qualcomm back in April, the vulnerabilities have been acknowledged by Qualcomm and ranked as high risk by the hardware company, which released patches to all affected OEMs. But this is yet another situation that highlights the tangled mess that is the vulnerability management process within the extremely fragmented Android marketplace.

The difficulty rests in the complicated nature of the Android device supply chain, which is not monolithic the way Apple's is due to the fact that the platform is used by so many different device manufacturers. Not only are there the OEM handset manufacturers that build out the devices, there are suppliers like Qualcomm that build the pieces and connecting software modules that are put together in the final product.

 "Original equipment manufacturers (OEMs) combine these software modules, Android builds from Google, and their own customizations to create a unique Android build for a particular device," explains the report. "Distributors resell the devices, often including their own customizations and apps –creating yet another unique Android build. When patches are required, they must flow through this supply chain before making it onto an end user’s device."

The process of rolling up a patch for a vulnerability like these found within a device component all the way up into individual builds can take an exceedingly long amount of time, if it happens at all. In many cases current devices in the hands of users are never patched because older versions of the Android platform don't support any further updates. Further adding a wrinkle into this is the fact that most of the updates that need to be made in devices already on the market are pushed out by another third-party, the network carrier. 

It is a thorny issue, and one without an immediate fix, though the Feds, for one, are already looking into it. In May, the Federal Trade Commission ordered a study to be carried out to figure out why the process is so broken. 

In this case, Check Point has released a new utility that helps individual users figure out if their devices are affected by QuadRooter.

Related Content:

 

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-22168
PUBLISHED: 2021-06-22
PHPGurukul Hospital Management System in PHP v4.0 has a SQL injection vulnerability in \hms\change-emaild.php. Remote unauthenticated users can exploit the vulnerability to obtain database sensitive information.
CVE-2020-22169
PUBLISHED: 2021-06-22
PHPGurukul Hospital Management System in PHP v4.0 has a SQL injection vulnerability in \hms\appointment-history.php. Remote unauthenticated users can exploit the vulnerability to obtain database sensitive information.
CVE-2020-22170
PUBLISHED: 2021-06-22
PHPGurukul Hospital Management System in PHP v4.0 has a SQL injection vulnerability in \hms\get_doctor.php. Remote unauthenticated users can exploit the vulnerability to obtain database sensitive information.
CVE-2020-22171
PUBLISHED: 2021-06-22
PHPGurukul Hospital Management System in PHP v4.0 has a SQL injection vulnerability in \hms\registration.php. Remote unauthenticated users can exploit the vulnerability to obtain database sensitive information.
CVE-2020-22172
PUBLISHED: 2021-06-22
PHPGurukul Hospital Management System in PHP v4.0 has a SQL injection vulnerability in \hms\get_doctor.php. Remote unauthenticated users can exploit the vulnerability to obtain database sensitive information.