Report: Sabine J. Schwartz

Google: Samsung, LG Phones Vulnerable Due to Leaked Certificates



In a major security leak admission, it has been revealed that a new key vulnerability has affected a number of major brands. The leaking of the signing keys made it possible for imposter apps to disguise themselves as “trusted” apps. Several companies took actions to control the vulnerability after it was reported in May. The security flaw was brought to light by ukasz Siewierski.

Sirwierski revealed how the platform certificates have been used to sign apps. This is not good. Very, very bad. The platform certificates of several vendors have been leaked. The “android” app is one of the system apps that these are used to sign. These certs are being used to sign malicious apps.

The crux of the issue is a vulnerability that could be exploited by malicious attackers. Android trusts applications that use a legitimate platform signing key, which is used to sign core system applications, through its shared user ID system. The leaked platform signing keys allow the creation of malicious software that can gain system-level permission on a target device.

All user data on the particular device would be made available to the attacker, just like another system app from the manufacturer signed with the same certificate. The vulnerability doesn’t necessarily require a user to install a new application. The leaked platform keys could be used to sign trusted apps. A user who downloaded such an application from a third-party website would not see a warning when installing it on their phone, as the certificate would match the one on their system.

The list of devices that have been affected by the critical vulnerability in its public disclosure has not been explicitly mentioned. A list of sample files is included in the disclosure. According to reports, the platform has confirmed the list of affected devices. The affected companies have been suggested ways to mitigate the issue by the search giant.

The first step is to replace the leaked signing keys with new ones. The company has urged all the manufactures of the operating system to drastically reduce the use of platform key for apps to sign other apps. The issue was first reported in May. Since then, all of the affected companies have taken actions to mitigate the vulnerabilities that were at hand.

According to the disclosure, some of the vulnerable keys were used for apps for the phones that were uploaded to the app store. The key compromise was reported as soon as possible. End users will be protected by user mitigations. To remain protected from potential security flaws such as the one disclosed by Google, users are advised to update their firmware versions to the latest available updates.