What to do about “master key” security flaw in Android?

landon

Apparently a significant security risk has been found in Android devices going all the way back to version 1.6. According to the folks at Bluebox security that found it, the flaw can be used to completely take over your Android phone, access passwords, and do lots of other unsavory things. As much as I like Android, rapid patches are not something that I would call common, so I assume this will be an issue for some time to come. What can be done to minimize risk in the meantime?

Topic: Security
Answer this Question

Answers

4 total
Christopher Nerney
Vote Up (8)

If you have a Samsung Galaxy S4, you're in luck because the South Korean manufacturer reportedly has produced a patch for that device, with Google and other Android device makers working on their own. Otherwise, here's what Bluebox recommends:

 

  • Device owners should be extra cautious in identifying the publisher of the app they want to download.
  • Enterprises with BYOD implementations should use this news to prompt all users to update their devices, and to highlight the importance of keeping their devices updated.
  • IT should see this vulnerability as another driver to move beyond just device management to focus on deep device integrity checking and securing corporate data.

 

 

jimlynch
Vote Up (6)

Relax: Google, Carriers Patching Android "Master Key" Exploit
http://www.tomshardware.com/news/Donut-Master-Key-Bluebox-Security-Explo...

"Now it seems that Google and wireless carriers are finally getting around to rolling out a security fix. Verizon Wireless is now issuing an OTA update from Motorola for the DROID RAZER HD and MAXX HD (pdf), but it's not the 4.2.2. update customers have been waiting for. Instead, it's a small 50 MB patch (v9.20.1.XT926) that reportedly enhances GPS reliability, data metering and Bluetooth connectivity, fixes a few SMS bugs and updates the Backup Assistant and SMARTACTIONS apps. It also supposedly fixes the four year-old "Master Key" security hole described by Forristal on the device level.

Gina Scigliano, Google's Android Communications Manager, confirmed with ZDNet that OEMs are now distributing patches to plug the Bluebox security hole. She also assured device owners that Google has not seen any signs of exploitation on Google Play and other Android app stores."

PapaRiver
Vote Up (5)

Google has released a patch to fix the flaw and has shared it will Android manufacturers. I’m sure that now we will all be getting updates promptly. Oh, wait.....no I’m not. 

wstark
Vote Up (4)

I like Christopher’s solution to get an S4 without the issue....except the unfortunate paying for it part. Otherwise, choose the apps you install carefully, and if possible install them from Google Play. A CIO article last week said that Google had already made changes to Play that removed any apps that exploit this, so there is attention being paid to the issue. As someone who sideloads a lot of apps from non-Play sources, news of this security hole is an issue of concern for personal use as well as from a BYOD perspective.

Ask a question

Join Now or Sign In to ask a question.
The evolving nature of cyberattacks demands a more dynamic response, according to government CIOs making an effort to implement real-time, continuous monitoring and reporting for security issues.
These tips and tools can help you keep your smartphone close, and protect your data if it strays.
Texas EquuSearch contends that FAA rules do not bar drones for 'humanitarian use'.
Revelations about U.S. secret surveillance programs have left China's Huawei Technologies exhausted on the public relations front, a top company executive said Wednesday.
Some Android apps thought to be vulnerable to the Heartbleed bug were spared because of a common coding error in the way they implemented their own native OpenSSL library.
The panic over the Heartbleed bug is proving to be a convenient distraction for hackers using standard techniques in a fresh wave of attacks targeting at least 18 U.S. universities, according to a computer security researcher.
'Triple-handshake attack' threat quashed in update for OS X Mavericks and Mountain Lion, and iOS 7.
BlackBerry today released an update to its BlackBerry Enterprise Service (BES) 10 software designed to address a "Heartbleed"-related OpenSSL vulnerability in the version of Apache Tomcat used within the BES BlackBerry Work Connect Notification Service. (A detailed breakdown of the vulnerability is available on NIST.gov.)
Still responding to the National Security Agency surveillance revelations, Google is reportedly preparing to help users beef up Gmail security with end-to-end encryption. The search giant is working on a way to make Pretty Good Privacy (PGP) encryption easier to use for Gmail fans, according to a report by Venture Beat.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness