{"id":1508,"date":"2015-07-29T16:26:04","date_gmt":"2015-07-29T21:26:04","guid":{"rendered":"https:\/\/sodpit.com\/?p=1508"},"modified":"2015-08-07T21:43:59","modified_gmt":"2015-08-08T02:43:59","slug":"android-in-2015","status":"publish","type":"post","link":"https:\/\/sodpit.com\/?p=1508","title":{"rendered":"Android in 2015?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; padding-top: 0px; padding-left: 0px; display: inline; padding-right: 0px; border: 0px;\" title=\"\" src=\"https:\/\/sodpit.com\/wp-content\/uploads\/2015\/07\/stagefright_v2_breakdown-e1438001259526-1024x266.jpg\" alt=\"\" width=\"604\" height=\"404\" border=\"0\" \/><\/p>\n<p>Update HERE:\u00a0<a href=\"https:\/\/sodpit.com\/2015\/08\/07\/stagefright-update\/\" target=\"_blank\">https:\/\/sodpit.com\/2015\/08\/07\/stagefright-update\/<\/a><\/p>\n<p>No device is secure and Google has proven that Android is no exception. \u00a0Google has sent fixes for some of these problems to device manufacturers and cell phone carriers. They blame the manufacturers and carriers for long delays in pushing these fixes to their users &#8211; which is true &#8211; BUT&#8230;\u00a0the manufacturers and carriers didn&#8217;t write the code OR cause ANY of these problems.<\/p>\n<p>I won&#8217;t be signing up for Android Auto any time soon.<\/p>\n<p>Here are some of the most recent vulnerabilities\u2026<\/p>\n<p>(I will follow up when I have more time)<\/p>\n<p><!--more--><\/p>\n<hr \/>\n<p><strong>\u201cMatroska\u201d Vulnerability (Low Priority)<\/strong> \/ Affects 50% of Android devices used today<br \/>\nJuly 29, 2015<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/trend-micro-discovers-vulnerability-that-renders-android-devices-silent\/\" target=\"_blank\">Trend Micro Discovers Vulnerability That Renders Android Devices Silent<\/a><\/p>\n<p>Can cause: \u201cNo ring tone, text tone, or notification sounds can be heard. The user will have have no idea of an incoming call\/message, and cannot even accept a call. Neither party will hear each other. The UI may become very slow to respond, or completely non-responsive. If the phone is locked, it cannot be unlocked.\u201d<\/p>\n<p>Mitigation:<br \/>\nNone so far. Reboot to fix.<\/p>\n<hr \/>\n<p><strong>\u201cStagefright\u201d Hack (Severe)<\/strong> \/ Affects 95% of Android devices used today<br \/>\nJuly 27, 2015<\/p>\n<p>Information:<br \/>\n<a href=\"http:\/\/blog.zimperium.com\/experts-found-a-unicorn-in-the-heart-of-android\/\" target=\"_blank\">Experts Found a Unicorn in the Heart of Android<\/a><\/p>\n<p>Possible Mitigation:<br \/>\n<a href=\"http:\/\/security.stackexchange.com\/questions\/95165\/how-exactly-does-the-stagefright-vulnerability-work-on-android\" target=\"_blank\">Make sure to disable all the &#8216;Auto-Download&#8217; features for MMS in your messaging apps (Hangouts, Messaging, etc.)<\/a><br \/>\nIt\u2019s too early to know as the vulnerability isn\u2019t public; there are no tests or patches available.<\/p>\n<hr \/>\n<p><strong>\u201cSwiftKey\u201d Vulnerability (Very\u00a0Low Severity)<\/strong> \/ Samsung Stock Keyboard Security Risk<br \/>\nJune 16, 2015<\/p>\n<p><a href=\"https:\/\/www.nowsecure.com\/keyboard-vulnerability\/\" target=\"_blank\">Samsung Keyboard Security Risk Disclosed: Over 600M+ Devices Worldwide Impacted (nowsecure.com)<\/a><br \/>\n<a href=\"https:\/\/www.nowsecure.com\/blog\/2015\/06\/16\/remote-code-execution-as-system-user-on-samsung-phones\/\" target=\"_blank\">Remote Code Execution as System User on Samsung Phones (nowsecure.com)<\/a><\/p>\n<p>I&#8217;m marking this one as Very Low Severity since it would almost be impossible for this exploit to work:\u00a0&#8220;<a href=\"http:\/\/swiftkey.com\/en\/blog\/samsung-keyboard-security-vulnerability-swiftkey\/\" target=\"_blank\">A\u00a0user must be connected to a compromised network (such as a spoofed public Wi-Fi network), where a hacker with the right tools has specifically intended to gain access to their device. This access is then only possible if the user\u2019s keyboard is conducting a language update at that specific time, while connected to the compromised network.<\/a>&#8221;<\/p>\n<p><a href=\"http:\/\/global.samsungtomorrow.com\/information-regarding-the-keyboard-security-issue-and-our-device-policy-update\/\" target=\"_blank\">Samsung&#8217;s Response&#8230;<\/a><\/p>\n<p>If the flaw in the keyboard is exploited, an attacker could remotely:<br \/>\n1 &#8211; Access sensors and resources like GPS, camera and microphone<br \/>\n2 &#8211; Secretly install malicious app(s) without the user knowing<br \/>\n3 &#8211; Tamper with how other apps work or how the phone works<br \/>\n4 &#8211; Eavesdrop on incoming\/outgoing messages or voice calls<br \/>\n5 &#8211; Attempt to access sensitive personal data like pictures and text messages<\/p>\n<p>Mitigation:<br \/>\n<a href=\"http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/the-samsung-swiftkey-vulnerability-what-you-need-to-know-and-how-to-protect-yourself\/\" target=\"_blank\">The Samsung SwiftKey Vulnerability \u2013 What You Need To Know, And How To Protect Yourself<\/a><\/p>\n<hr \/>\n<p><strong>\u201cFakeID\u201d Vulnerability (Severe)<br \/>\n<\/strong>July 29, 2014<\/p>\n<p><a href=\"https:\/\/bluebox.com\/technical\/android-fake-id-vulnerability\/\" target=\"_blank\">Android Fake ID Vulnerability Lets Malware Impersonate Trusted Applications, Puts All Android\u2026<\/a><\/p>\n<p>\u201c\u2026Allows a malicious application to inject Trojan horse code (in the form of a webview plugin) into other apps, which leads to taking control of the entire app, all of the apps\u2019s data, and being able to do anything the app is allowed to do.\u201d<\/p>\n<p>Mitigation:<br \/>\n<a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.bluebox.labs.onerootscanner\" target=\"_blank\">Bluebox Security Scanner for Android<\/a><br \/>\nTest if your system is vulnerable or patched to any of the &#8220;Fake ID&#8221; or &#8220;Master Key&#8221; security flaws affecting most Android devices<\/p>\n<hr \/>\n<p><strong>\u201cMaster Key\u201d Exploit (Severe)<br \/>\n<\/strong>July 3, 2013<\/p>\n<p><a href=\"https:\/\/bluebox.com\/technical\/uncovering-android-master-key-that-makes-99-of-devices-vulnerable\/\" target=\"_blank\">Android Master Key Exploit \u2013 Uncovering Android Master Key\u2026<\/a><\/p>\n<p>\u201cInstallation of a Trojan application from the device manufacturer can grant the application full access to Android system and all applications (and their data) currently installed. The application then not only has the ability to read arbitrary application data on the device (email, SMS messages, documents, etc.), retrieve all stored account &amp; service passwords, it can essentially take over the normal functioning of the phone and control any function thereof (make arbitrary phone calls, send arbitrary SMS messages, turn on the camera, and record calls). Finally, and most unsettling, is the potential for a hacker to take advantage of the always-on, always-connected, and always-moving (therefore hard-to-detect) nature of these \u201czombie\u201d mobile devices to create a botnet.\u201d<\/p>\n<p>Mitigation:<br \/>\n<a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.bluebox.labs.onerootscanner\" target=\"_blank\">Bluebox Security Scanner for Android<\/a><br \/>\nTest if your system is vulnerable or patched to any of the &#8220;Fake ID&#8221; or &#8220;Master Key&#8221; security flaws affecting most Android devices<\/p>\n<hr \/>\n","protected":false},"excerpt":{"rendered":"<p>Update HERE:\u00a0https:\/\/sodpit.com\/2015\/08\/07\/stagefright-update\/ No device is secure and Google has proven that Android is no exception. \u00a0Google has sent fixes for some of these problems to device manufacturers and cell phone carriers. They blame the manufacturers and carriers for long delays in pushing these fixes to their users &#8211; which is true &#8211; BUT&#8230;\u00a0the manufacturers and &hellip; <a href=\"https:\/\/sodpit.com\/?p=1508\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Android in 2015?<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[4],"tags":[],"class_list":["post-1508","post","type-post","status-publish","format-standard","hentry","category-main"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2FmUa-ok","jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/sodpit.com\/index.php?rest_route=\/wp\/v2\/posts\/1508","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sodpit.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sodpit.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sodpit.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sodpit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1508"}],"version-history":[{"count":14,"href":"https:\/\/sodpit.com\/index.php?rest_route=\/wp\/v2\/posts\/1508\/revisions"}],"predecessor-version":[{"id":1527,"href":"https:\/\/sodpit.com\/index.php?rest_route=\/wp\/v2\/posts\/1508\/revisions\/1527"}],"wp:attachment":[{"href":"https:\/\/sodpit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1508"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sodpit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1508"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sodpit.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1508"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}