Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

8/8/2016
02:18 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Newly Announced Chipset Vuln Affects 900 Million Android Devices

Check Point Research Team details four vulnerabilities that can easily lead to full privilege escalation.

Over 900 million Android smartphones and tablets are at risk of a full device compromise due to a dangerous grouping of vulnerabilities found and discussed at length at Defcon yesterday by researchers with Check Point Research Team. Dubbed the QuadRooter vulnerabilities, each of the foursome uncovered by these researchers enables attackers to trigger privilege escalation and eventually achieve root in affected devices.

All four vulnerabilities are hidden in different software drivers control communication between hardware components developed in Qualcomm chipsets for these devices. They're found in four different modules: the inter-process communication router module, a shared memory feature, and two different graphics modules. They're folded directly into the Android operating system developed for each original equipment manufacturer (OEM) that uses these chipsets within their devices, including Samsung, HTC, Motorola and LG, among many others.

"An attacker can exploit these vulnerabilities using a malicious app," wrote Check Point researchers in a report on the vulnerabilities. "These apps require no special permissions to take advantage of these vulnerabilities, alleviating any suspicion users may have when installing."

 First disclosed to Qualcomm back in April, the vulnerabilities have been acknowledged by Qualcomm and ranked as high risk by the hardware company, which released patches to all affected OEMs. But this is yet another situation that highlights the tangled mess that is the vulnerability management process within the extremely fragmented Android marketplace.

The difficulty rests in the complicated nature of the Android device supply chain, which is not monolithic the way Apple's is due to the fact that the platform is used by so many different device manufacturers. Not only are there the OEM handset manufacturers that build out the devices, there are suppliers like Qualcomm that build the pieces and connecting software modules that are put together in the final product.

 "Original equipment manufacturers (OEMs) combine these software modules, Android builds from Google, and their own customizations to create a unique Android build for a particular device," explains the report. "Distributors resell the devices, often including their own customizations and apps –creating yet another unique Android build. When patches are required, they must flow through this supply chain before making it onto an end user’s device."

The process of rolling up a patch for a vulnerability like these found within a device component all the way up into individual builds can take an exceedingly long amount of time, if it happens at all. In many cases current devices in the hands of users are never patched because older versions of the Android platform don't support any further updates. Further adding a wrinkle into this is the fact that most of the updates that need to be made in devices already on the market are pushed out by another third-party, the network carrier. 

It is a thorny issue, and one without an immediate fix, though the Feds, for one, are already looking into it. In May, the Federal Trade Commission ordered a study to be carried out to figure out why the process is so broken. 

In this case, Check Point has released a new utility that helps individual users figure out if their devices are affected by QuadRooter.

Related Content:

 

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Vulnerability Management Has a Data Problem
Tal Morgenstern, Co-Founder & Chief Product Officer, Vulcan Cyber,  1/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This is not what I meant by "I would like to share some desk space"
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-28452
PUBLISHED: 2021-01-20
This affects the package com.softwaremill.akka-http-session:core_2.12 from 0 and before 0.6.1; all versions of package com.softwaremill.akka-http-session:core_2.11; the package com.softwaremill.akka-http-session:core_2.13 from 0 and before 0.6.1. CSRF protection can be bypassed by forging a request ...
CVE-2020-28483
PUBLISHED: 2021-01-20
This affects all versions of package github.com/gin-gonic/gin. When gin is exposed directly to the internet, a client's IP can be spoofed by setting the X-Forwarded-For header.
CVE-2021-21269
PUBLISHED: 2021-01-20
Keymaker is a Mastodon Community Finder based Matrix Community serverlist page Server. In Keymaker before version 0.2.0, the assets endpoint did not check for the extension. The rust `join` method without checking user input might have made it abe to do a Path Traversal attack causing to read more f...
CVE-2020-25686
PUBLISHED: 2021-01-20
A flaw was found in dnsmasq before version 2.83. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same...
CVE-2020-25687
PUBLISHED: 2021-01-20
A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. This flaw allows a remote attacker, who can create valid DNS replies, to cause an overflow in a heap-allocated memory. This...