mobile_threat_blog_icon

Mobile Threat Blog

  • Mobile
    Security Insights
  • Mobile
    Threat Research
  • Mobile
    Security Tips
Share

On September 5, 2017 Google released an Android Security Bulletin containing details of security vulnerabilities affecting Android devices. Android security updates normally include two parts: general updates that affect most users and the updates affecting specific partners, such as hardware partners like NVIDIA, Broadcom and Qualcomm. Here we’ve summarized the general security updates on the Android Security bulletin from Security Patch level 2017-09-01.

  • 13 Remote Code Execution Vulnerabilities: These types of vulnerabilities allow attackers to execute arbitrary codes on user devices. Ten of the discovered vulnerabilities are considered critical and three are considered high severity. The vulnerabilities are found in the Android media framework and system libraries (such as libnl and libskia).
  • 9 Denial of Service Vulnerabilities: These types of vulnerabilities disable users’ ability to use the phone or access certain services. All of them are considered high impact. The vulnerabilities are found in the Android media framework and Android runtime libraries.
  • 7 Privilege Escalation Vulnerability: This type of vulnerability allows unprivileged processes, such as from third-party apps, to escalate privileges to the system-level bypassing the sandbox restrictions. Six of them are rated as high impact, while one is rated as medium impact. They are found in the Android framework, system libraries, Android media framework, and Android system.
  • 4 Information Disclosure Vulnerabilities: These vulnerabilities allow malicious apps to access user data. All of them are rated as medium impact. The vulnerabilities are found in the Android media framework.

Appthority urges users to update their Android devices to the latest OS version which includes these security updates. We also recommend enterprise IT admins set strong policies against keeping outdated OS versions on their employees’ mobile devices.

Back