Researchers disclose high-severity zero-day vulnerability for Android OS

In News

A high-severity, zero-day security vulnerability for Android OS, which resides in the Video for Linux 2 (v4l2) driver has been disclosed. To exploit this vulnerability, attackers first needs to have local access to the device, following which they can take complete control of the device.

This vulnerability doesn’t help hackers break into users’ phones or attack remotely. Local access is required to inject malicious code, which can then be used to hijack the device.

Lance Jiang and Moony Li of TrendMicro Research first reported this vulnerability to Google in March. Google acknowledged it and promised a fix, but no ETA was provided.

After Google released its September 2019 Android Security Bulletin, which did not include a fix for this vulnerability, researchers from TrendMicro went public with the details.

With no security fix from Google, it is up to the Android users to keep their devices safe from attacks. It is highly recommended that users install applications only from verified sources.

Comments

You may also read!

McAfee unveils McAfee MVISION Cloud for Containers

McAfee has announced McAfee MVISION Cloud for Containers, thereby becoming the first unified cloud security platform to integrate container

Read More...

Empello cautions Android users in the UAE

Empello has to day cautioned the Android users in the UAE on the increase in the number of mobile

Read More...

BlueKeep attacks prompt fresh warnings

Amer Owaida, Security Writer at ESET discusses the infamous vulnerability has been exploited for a cryptocurrency mining campaign, but

Read More...

Join Our Newsletter!

Love SecurityMEA? We love to tell you about our new stuff. Subscribe to newsletter!

Mobile Sliding Menu