• After 15+ years, we've made a big change: Android Forums is now Early Bird Club. Learn more here.

'Quadrooter' flaws could give malicious apps root access to 900 million Android phones

All Android devices powered by Qualcomm processors are susceptible to malicious attacks due to "Quadrooter" flaws. The vulnerability allows a malicious app to gain root access to the phone, giving it full control of the device and the information stored on it. All of the 2016 flagship smartphones are vulnerable to the Quadrooter flaws - even the QTEK50 which Blackberry is touting as the "most secure Android smartphone." Qualcomm has been aware of the issue and has supplied fixes to the flaws to its manufacturer partners, but there is no indication that any of them have released the fixes to their devices yet. Google has already released a fix for three of the Quadrooter flaws in previous security updates, but the final fourth flaw will not be patched until the September Android security update is released.
 
Last edited by a moderator:
Android Central has a more more reasonable (less fear-mongering) write-up on the threat actually posed by QuadRooter.

Threats like these tend to be initially reported by a company that stands to gain by doing so (nearly always a "security" company no one has ever heard of, but be sure to install our app to make sure you're protected!), and then the media runs amok because (a) omg that sounds scary and (b) independent research and understanding is just hard.

In reality, the number of "vulnerable" phones is not 900 million, as the vulnerability (like many others) requires a malicious APK to be installed from outside the Play Store.

Google was also made aware of the vulnerabilities months ago, so you can bet your butt that they've updated their malware scanners (both Bouncer for the Play Store and the Verify Apps feature mandatory on Android phones since Jellybean) accordingly.

So actually being affected by this scary-sounding exploit would require an unwitting user to:
  1. have a device with a Qualcomm SoC (they're popular, sure, but far from the only game in town), and
  2. enable the "Unknown Sources" option buried in their phone's security settings, and
  3. accidentally download an infected APK (likely from a site offering pirated apps and games), and
  4. attempt to install said infected APK, which would most likely result in a scary warning from the Verify Apps feature letting you know that dragons be ahead and you really shouldn't do the thing you're trying to do, and
  5. install it anyway.

Keep in mind that Google's malware detection/protection systems can be updated effectively in real-time thanks to the Google Play Services framework - with that, you can be protected from threats like these even without requiring the specific vulnerabilities to be patched.


So sure, be careful about what apps you install and from where, but that's just common sense. There's no need to panic just because another security vendor got their exploit with a catchy name published in the news.
 
@svim thanks for the CVE links - I was curious, but not curious enough to give Check Point my information just so I could download their whitepaper (hmm, it's almost like they're trying to sell something...).

Also, according to Android Central Google has confirmed that all Android 4.2+ devices are already automatically protected against malicious apps seeking to exploit these vulnerabilities thanks to the Verify Apps thing:

"We appreciate Check Point's research as it helps improve the safety of the broader mobile ecosystem. Android devices with our most recent security patch level are already protected against three of these four vulnerabilities. The fourth vulnerability, CVE-2016-5340, will be addressed in an upcoming Android security bulletin, though Android partners can take action sooner by referencing the public patch Qualcomm has provided. Exploitation of these issues depends on users also downloading and installing a malicious application. Our Verify Apps and SafetyNet protections help identify, block, and remove applications that exploit vulnerabilities like these."
 
It's probably possible to make your own security fix for your custom rom if you have one.
 
Back
Top