New Stagefright Attack Vectors

 



We recently analyzed some of the things you can do to protect your device against Stagefright, and to sum it up, it all comes down to disabling MMS auto retrieve within your default messaging app, the function that when turned on, makes your phone automatically download any received MMS through which the malicious code (if present) can execute itself.

Still, the only thing that offers full protection are the security patches as provided by Google. With auto retrieve turned off, the MMS won’t download automatically, but your device could still get infected if you choose to download the media yourself.

How Stagefright Bug 2.0 Works

Both newly discovered vulnerabilities (CVE-2015-6602 and CVE-2015-3876) also reside in the Android Media Playback Engine called 'Stagefright' and affects all Android OS version from 1 to latest release 5.1.1.
Reportedly, merely previewing a maliciously crafted song or video file would execute the Stagefright Bug 2.0 exploit, allowing hackers to run remote codes on the victim's Android device.

New Stagefright Attack Vectors

The Stagefright Bug 2.0 vulnerability can be triggered (attack vectors) by:
  • Webpage
  • Man-in-the-middle attack
  • Third-party media player
  • Instant messaging apps

"Additionally, the attacker gains a foothold, from which they could conduct further local privilege escalation attacks and take complete control of the device," Zimperium said.

Google has scheduled monthly Android Security Update on 5th October 2015, which will patch newly discovered vulnerabilities for Nexus devices.
Google has already shared vulnerability report and patches with OEM Partners on Sept. 10. So you might be receiving patches soon from your Android device manufacturer.

1 comment:
Write comments