Story image

'The Red Team' discovers widespread Android vulnerability

09 May 16

A new, widespread Android vulnerability has been identified by FireEye and Mandiant, the consultancy arm of the company.

According to a new report, Mandiant’s Red Team discovered the vulnerability permits local privilege escalation to the built-in user ‘radio’, making it so an attacker can potentially perform activities such as viewing the victim’s SMS database and phone history. 

According to the Red Team, the vulnerability was introduced when Qualcomm provided new APIs as part of the 'network_manager' system service, and subsequently the 'netd' daemon, that allow additional tethering capabilities, possibly among other things.

Since many flagship and non-flagship devices use Qualcomm chips and/or Qualcomm code, it is possible that hundreds of models are affected across the last five years, the team says.

Qualcomm has addressed the issue by patching the 'netd' daemon. Qualcomm notified their customers (all of the OEMs) in early March 2016. The OEMs will now need to provide updates for their devices; however, many devices will likely never be patched, the Red Team says.

There are two ways to exploit this vulnerability, though this does not account for a determined attacker who possesses additional vulnerabilities. The first is to have physical access to an unlocked device, and the second is to have a user install a malicious application on the device.

On older devices, the malicious application can extract the SMS database and phone call database, access the internet, and perform any other capabilities allowed by the 'radio' user. Some examples of potential capabilities of the 'radio' user are presented in the blog itself, though it was difficult for all of these to be tested, according to the report.

The impact of the vulnerability depends entirely on how the OEM is using the system property subsystem, the Red Team says. It should be noted that once the vulnerability is exploited, there is no indication to the user that something has happened. For example, there is no performance impact or risk of crashing the device.

Since this is an open-source software package developed and made freely available by Qualcomm, people are using the code for a variety of projects, including Cyanogenmod (a fork of Android). The vulnerable APIs have been observed in a Git repository from 2011, indicating that someone was using this code at that time. This will make it particularly difficult to patch all affected devices, if not impossible, the Red Hat team concludes.

Virtustream launches cloud automation and security capabilities
Virtustream Enterprise Cloud enhancements accelerate time-to-value for enterprises moving mission critical apps to the cloud.
Twitter suspects state-sponsored ties to support forum breach
One of Twitter’s support forums was hit by a data breach that may have ties to a state-sponsored attack, however users' personal data was exposed.
How McAfee aims to curb enterprise data loss
McAfee DLP aims to help safeguard intellectual property and ensure compliance by protecting sensitive data.
2018 sees 1,500% increase in coinmining malware - report
This issue will only continue to grow as IoT forms the foundation of connected devices and smart city grids.
2019 threat landscape predictions - Proofpoint
Proofpoint researchers have looked ahead at the trends and events likely to shape the threat landscape in the year to come.
Exclusive: Three access management learnings from 2018
There was a renewed global response to data security in 2018, placing pressure on organisations to assume more responsibility for the data they hold.
Mac malware on WatchGuard’s top ten list for first time
The report is based on data from active WatchGuard Firebox unified threat management appliances and covers the major malware campaigns.
Bin 'em: Those bomb threat emails are complete hoaxes
A worldwide spate of spam emails claiming there is a bomb in the recipient’s building is almost certainly a hoax.