Android Police

Articles Tagged:

exploit

19

'Simjacker' exploit can compromise vulnerable phones with just an SMS message

Yesterday, security researchers at AdaptiveMobile Security revealed the existence of a new exploit they call "Simjacker," which they say allows for remote surveillance from targeted phones (among other potential actions) using nothing more than a malicious SMS. They even claim that the exploit has been actively used over the last two years by "a highly sophisticated threat actor in multiple countries." It all sounds like a pretty big deal, and unfortunately for concerned consumers, the researchers leave plenty of unanswered questions.

Read More
41

Update your browser right now: Google releases fix for zero-day exploit in Chrome

Another day, another major security hole is found in a widely used piece of software. This time around, a flaw in Chrome's implementation of the FileReader API allowed sites to break out of their sandbox and execute native code. To make matters worse, Google said the exploit was being actively used before the company fixed it.

Read More
32

Amazon Fire TV Cube and 2017 Fire TV Stick rooted using HDMI exploit

Amazon released the Fire TV Cube earlier this year, as a 4K-capable streaming device with far-field microphones (for responding to Alexa responses) and an IR transmitter (for turning devices on/off). Exploitee.rs has now released a root method for the Fire TV Cube and the 2017 Fire TV Stick, which relies on sending commands through the HDMI port and bypassing code verification.

Read More
1

Harmony Hub had a vulnerability, but it's been patched in version 4.15.96

Over the past few days, we've covered an issue with the Harmony Hub not being able to control Sonos speakers' volume properly, which was followed by a fix with firmware 4.15.100. As it turns out, the issue occurred because Logitech may have rushed to release firmware version 4.15.96 for the hub to patch a vulnerability discovered by FireEye.

Read More
55

Tegra X1 processor vulnerability discovered, affects Nvidia Shield, Pixel C, and Nintendo Switch

The Tegra X1 is one of Nvidia's latest mobile processors, powering devices like the Nintendo Switch, Google Pixel C, and Nvidia Shield. It's not uncommon that vulnerabilities are discovered in SoCs, and that has just happened for the Tegra X1. Katherine Temkin and the ReSwitched hacking team have just released details about a security flaw, nicknamed 'Fusée Gelée,' that allows unauthenticated arbitrary code execution on devices using the Tegra chip.

Read More
129

[Update x3: Qualcomm responds] OnePlus left a backdoor in its devices capable of root access

Just a month ago, OnePlus was caught collecting personally identifiable data from phone owners through incredibly detailed analytics. While the company eventually reversed course on the data collection, another discovery has been made in the software of OnePlus phones. One developer found an application intended for factory testing, and through some investigation and reverse-engineering, was able to obtain root access using it.

Read More
45

Recently revealed "Cloak & Dagger" Android attack uses overlays and accessibility services to deceive users

A new series of vulnerabilities in Android have been discovered by researchers at the University of California Santa Barbara and the Georgia Institute of Technology. Titled "Cloak & Dagger" this new class of vulnerabilities and attack vectors makes use of overlays and accessibility service permissions in Android. These services can potentially allow for a malicious application to perform unwanted actions, including collecting data input on the device and so-called "clickjacking." The latter term being when a user might believe they are performing one action, but another is occurring beneath a deceptive overlay.

Read More
27

Exploitee.rs hacked the Samsung Smartcam yet again, this time with a root exploit

The Samsung Smartcam is a great example of why consumers should be wary of 'Internet of Things' devices. Multiple exploits for the camera have been found since the Smartcam initially went on sale, previously allowing for remote command execution and changing the admin password without knowing the original one. Now another exploit has been discovered for the Smartcam, this time allowing commands to be executed as the root user.

Read More
17

SuperSU 2.77 beta available for Note7, but there are caveats

Android developer extraordinaire Chainfire has worked his magic again, releasing a new beta of SuperSU with support for the Galaxy Note7. There are a few caveats though, mostly due to new Samsung security measures inherent in the kernel, stopping Chainfire from using his usual exploits and instead having to apply workarounds.

In short, Chainfire says that Samsung has applied new built-in protection methods directly to the kernel. Any time a 'privileged' process that has a uid/gid value equal to or below 1000, it causes the device to kernel panic, meaning it immediately reboots. As most root processes have a value below 1000, the device restarts as expected, causing headaches for both users and developers.

Read More
14

Verizon Rolls Out Its First Stagefright Fix, And It's For The Galaxy Note Edge - Build LRX22C.N915VVRU2BOG5

Verizon has begun rolling out an update for the Galaxy Note Edge that should address the vulnerability in Stagefright, one of Android's media libraries, that could potentially compromise a user's device. This is the first Stagefright-related fix we're aware of Verizon rolling out.

thewholething

Of course, the changelog doesn't specifically mention Stagefright... but it's really obvious that's what it's for, given the timing of the update and terseness of the document. You can probably expect a slew of Samsung Stagefright fixes (as well as other OEMs, of course) on Verizon to follow, if this is any sign.

Read More