Google Pixel Phones Have a Vulnerability That Can Give Hackers High-Level Device Access

  • Cybersecurity firm iVerify found a vulnerability in Google Pixel apps that has existed since 2017 and could be affecting millions of users.
  • The vulnerability was found in a pre-installed app called Showcase.apk that was used for turning on the demo mode in the device for in-store displays.
  • The vulnerability has already been addressed by Google and it said that a patch is on the way.

Pixel Phones’ Vulnerability Can Give Hackers High-Level Access

A serious vulnerability has been discovered in a pre-installed Google Pixel app that could affect millions of users. The discovery was made by cybersecurity firm iVerify who published a complete report on it.

The vulnerability lies within a pre-installed Android app called Showcase.apk developed by Smith Micro. It was used to enable demo mode in devices for in-store display.

Initially not a part of the Android firmware, it was later embedded in it at the request of Verizon (the mobile carrier).

The app is very powerful with high system privileges. If compromised, threat actors can use it to execute remote codes or install malicious packages on the device.

However, before this app can be compromised, there needs to be an entry point. This entry point is provided by the way Showcase.apk communicates with its host.

‘“The application downloads a configuration file over an insecure connection and can be manipulated to execute code at the system level’ – iVerify’s report

In simple terms, the app retrieves its configuration file from a single US-based domain hosted on Amazon Web Services (AWS) over an unsecured HTTP connection. This insecure connection makes the files in transit vulnerable to interception, thus risking the device.

Google Is Already Working on a Fix

The vulnerability is present in many devices that have been shipped since 2017. So the total number of users at risk could be in the millions. But the good news is, a fix is already underway.

  • Google has addressed the issue and said that it will soon release a patch for all “supported in-market Pixel devices” in a few weeks.
  • This doesn’t include the Pixel 9 series because when tested, none of the four models in the series had this vulnerability.
  • Verizon has also been notified about the vulnerability. Although it no longer uses the app and didn’t get any evidence of ongoing exploitation, it has still decided to remove the function from all the devices it supports just to be extra safe.
  • Lastly, Google also said that this isn’t an issue with Pixel phones or Android. The problem lies with Smith Micro.
  • So Google has also decided to notify other Android manufacturers since third-party devices might also have this problem.

The good news – so far there is no indication that the vulnerability has been exploited. It’s probably because no threat actors are aware of it or because the app is not enabled by default.

But now that the news is public, let’s just hope that Google’s fix reaches before any malicious actor can exploit the flaw.

The Tech Report - Editorial ProcessOur Editorial Process

The Tech Report editorial policy is centered on providing helpful, accurate content that offers real value to our readers. We only work with experienced writers who have specific knowledge in the topics they cover, including latest developments in technology, online privacy, cryptocurrencies, software, and more. Our editorial policy ensures that each topic is researched and curated by our in-house editors. We maintain rigorous journalistic standards, and every article is 100% written by real authors.

Note: This article have been indexed to our site. We do not claim legitimacy, ownership or copyright of any of the content above. To see the article at original source Click Here

Related Posts
Kioxia отмечает 35-ю годовщину изобретения флеш-памяти NAND thumbnail

Kioxia отмечает 35-ю годовщину изобретения флеш-памяти NAND

10.02.2022 [21:35],  Николай Хижняк Компания Kioxia, являющаяся наследницей бизнеса по производству памяти корпорации Toshiba, отмечает 35-летие технологии, изменившей и продолжающей менять мир — в 1987 году инженером компании Toshiba Фудзио Масуокой была создана флеш-память NAND. Источник изображений: Kioxia Напомним, в 2017 году Toshiba Memory была выделена из Toshiba, а в 2019-м переименована в Kioxia. Как отмечает компания, ежегодные…
Read More
Striking Intel Arc Alchemist desktop graphics card shimmers in silver in unofficial renders as release dates are leaked thumbnail

Striking Intel Arc Alchemist desktop graphics card shimmers in silver in unofficial renders as release dates are leaked

Reviews, News, CPU, GPU, Articles, Columns, Other "or" search relation.3D Printing, 5G, Accessory, AI, Alder Lake, AMD, Android, Apple, ARM, Audio, Business, Camera, Cannon Lake, Cezanne (Zen 3), Charts, Chinese Tech, Chromebook, Coffee Lake, Comet Lake, Console, Convertible / 2-in-1, Cryptocurrency, Cyberlaw, Deal, Desktop, E-Mobility, Exclusive, Fail, Foldable, Gadget, Galaxy Note, Galaxy S, Gamecheck, Gaming,…
Read More
GNOME 42带来新的屏幕截图应用 界面大改 thumbnail

GNOME 42带来新的屏幕截图应用 界面大改

去年Google Summer of Code期间,GNOME开发了一个更新的屏幕截图和屏幕记录器用户界面,这个改进后的截图/截屏用户界面在本周被合并到GNOME 42中。在此之前,GNOME允许屏幕录制,但这是通过组合键来完成而不是通过GNOME Screenshot用户界面。 只有键盘快捷键才能调出的屏幕录制启动很显然对用户不是很友好,不仅如此,GNOME截屏应用还缺乏在替代品中发现的各种功能。GNOME 42的这个新实现能够从一个单一的用户界面提供屏幕截图和屏幕录像,它本身已经是GNOME Shell的一部分。新的屏幕截图界面在代码审查了五个月后于本周被合并,同时也取决于各种Mutter的变化,今天合并的是新用户界面的截屏部分。通过GSoC学生开发者Ivan Molodetskikh的这篇博文,可以了解到更多关于这个新的GNOME屏幕截图界面的细节:https://imolodetskikh.wordpress.com/2021/06/29/gsoc-2021-gnome-shell-screenshot-ui/在即将于3月23日发布的GNOME 42.0中,可以看到这个新的用户界面和许多其他功能。了解更多:https://gitlab.gnome.org/GNOME/gnome-shell/-/merge_requests/1954
Read More
Index Of News
Total
0
Share