The group of Check Point security of Israeli origin, discovered a set of computer vulnerabilities affecting equipped with Qualcomm processors Android devices home. There would be 900 million cellular affected. That means it is one of the biggest gaps discovered reach.
Check Point discovered four vulnerabilities. They were christened as ‘Quadroot’. If any security breaches is exploited, the attacker can obtain privileged access to operating system files.
cybercriminal can exploit security flaws by a malicious application. It is not necessary that the application requests special permits, which makes it difficult to detect.
The gaps affected, in particular, parts of the software that controls the Qualcomm processors. to solve the problem, you need to Qualcomm distribute a corrected version of the drivers. Operators or manufacturers who receive the patch must distribute the software in your database repaired devices.
Qualcomm was notified of these vulnerabilities 90 days ago. During that period, the firm has produced the necessary patches to solve the problem.
It affects brands such as Samsung, HTC, Motorola, LG, Huawei, OnePlus and Sony, among others. . They even hit devices recognized by focusing on safety as the BlackBerry Priv and blackphone
four modules affected are:
IPC Router provides communication between various components. of Qualcomm processors.
Ashmem. facilitates processes to share memory buffers efficiently.
graphics controller kernel. Two components of this area, the kgsl (kernel graphics support layer) and kgsl_sync (kernel graphics support layer sync) have security breaches.
check Point recommends users to download and install the latest Android updates available. It also suggests not install Android apps that are not in the official store. Check that your applications do not apply for permission to settle unusual. Be suspicious when an ‘app’ consume more battery than usual. Finally, access to wireless networks of trust in their travels.
Check Point launched an application to check if your phone is vulnerable. Download it from here: http://bit.ly/2b8itsj
See the full report: http://bit.ly/2aGLQQY
technosphere
No comments:
Post a Comment