On June 5, 2017 Google released an Android Security Bulletin containing details of security vulnerabilities affecting Android devices. Android security updates normally include two parts: general updates that affects most users and the updates affecting specific partners, such as hardware partners like NVIDIA, Broadcom and Qualcomm. Here we’ve summarized the general security updates on the Android Security bulletin from Security Patch level 2017-06-01.
- 10 Remote Code Execution Vulnerabilities: These types of vulnerabilities allow attackers to execute arbitrary codes on user devices. One of the discovered vulnerabilities is considered critical, seven are considered high severity, and two are considered moderate severity. The vulnerabilities are found in system libraries (such as libnl and libskia), the Android media framework, and the System UI.
- 7 Denial of Service Vulnerabilities: These types of vulnerabilities disable users’ ability to use the phone or access certain services. Six of them are considered high impact, and one is medium impact. The vulnerabilities are found in system libraries and the Android media framework.
- 3 Information Disclosure Vulnerabilities: These vulnerabilities allow malicious apps to access user data. One is rated as high impact and the rest are rated as medium impact. The vulnerabilities are found in Bluetooth and system libraries.
- 1 Privilege Escalation Vulnerability: This type of vulnerability allows unprivileged processes, such as from third-party apps, to escalate privileges to the system-level bypassing the sandbox restrictions. One of this type of vulnerability is found in Bluetooth and considered as moderate impact.
Appthority urges users to update their Android devices to the latest OS version which includes these security updates. We also recommend enterprise IT admins set strong policies against keeping outdated OS versions on their employees’ mobile devices.