An American security researcher posted proof-of-concept code on GitHub for the recently released zero-day Android.
Following the unveiling of CVE-2019-2215, Maddie Stone - her security researcher Google- published proof-of-consept (PoC) code. However, the code provided read or write access to the kernel.
In a post published yesterday by a PhD candidate at the Florida Institute of Cyber Security at the University of Florida, Grant Hernandez published a PoC that does just that. This PoC with code Qu1ckR00t, can bypass the DAC and capabilities Linux and can disable SELinux, SECCOMP (Secure Computing Mode) and MAC (Mandatory Access Control).
The code was released on GitHub, in the format source code and not as an APK file application Android). Users will have to complete it themselves, but upon completion, they will have access to an app that can take advantage of an Android smartphone with one click.
Hernandez argues that only Qu1ckR00t was tested with devices Pixel 2 and warns inexperienced users to stop playing with the code as they run the risk of blocking their operating system and losing data.
Such a tool can only have disadvantages. With its release, Cybercriminals have the ability to study the code, as do users. This could potentially lead to malicious apps that will allow access to Android devices, spyware, trojans, ransomware etc.
To avoid any problems, users are advised to install the necessary fixes. Google has issued patches for vulnerability CVE-2019-2215, in the Android security bulletin for October.
Devices running Android 8.x and later are considered vulnerable.
How useful was this post?
Average rating / 5. Vote count:
No votes so far! Be the first to rate this post.