Recently uncovered security flaws could mean trouble for owners of devices that run the Android operating system. Researchers at security firm Check Point recently discovered the vulnerabilities, together labeled Quadrooter, which may affect as many as 900 million Android devices.
Speaking about the discoveries last week at the Def Con security conference in Las Vegas, Adam Donenfeld, Check Point’s lead mobile security researcher, revealed four new privilege escalation exploits that can be used to remotely gain root access to Android handsets.
To gain access, an attacker just has to get the user to install a malicious app. From there the attacker has full access to saved data and can also change or remove system-level files, delete or add apps and gain access to the device’s screen, camera, or microphone, said Donenfeld.
As Donenfeld explained it, Google made several changes in the Android landscape to tighten security, but vulnerabilities have slipped through anyway. He also noted that Google is not the only company struggling to keep Android safe. Qualcomm, which makes 80 percent of the chipsets in the Android ecosystem, has almost as much of an effect on Android?EU?s security as Google.
“If exploited, Quadrooter vulnerabilities can give attackers complete control of devices and unrestricted access to sensitive personal and enterprise data on them,” Check Point said in a blog post. “Access could also provide an attacker with capabilities such as keylogging, GPS tracking, and recording video and audio.”
Check Point examined Qualcomm?EU?s code in Android devices, finding what it called multiple privilege escalation vulnerabilities in multiple subsystems introduced by Qualcomm to all its Android devices in multiple different subsystems.
In its Def Con presentation, the company reviewed the privilege escalation vulnerabilities it found and demonstrated a detailed exploitation that bypassed the existing mitigations in Android?EU?s Linux kernel to run kernel-code, elevating…