Security News > 2019 > October > Researcher releases PoC rooting app that exploits recent Android zero-day
Late last month Google Project Zero researcher Maddie Stone detailed a zero-day Android privilege escalation vulnerability (CVE-2019-2215) and revealed that it is actively being exploited in attacks in the wild. She also provided PoC code that could help researchers check which Android-based devices are vulnerable and which are not. One of those has decided to go further. Achieving “root” through a malicious app “The base PoC left us with a full kernel read/write primitive, essentially … More → The post Researcher releases PoC rooting app that exploits recent Android zero-day appeared first on Help Net Security.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/dxxv3lh8djM/
Related news
- PoC exploit released for RCE zero-day in D-Link EXO AX4800 routers (source)
- Google Warns: Android Zero-Day Flaws in Pixel Phones Exploited by Forensic Companies (source)
- Researchers Uncover First Native Spectre v2 Exploit Against Linux Kernel (source)
- Exploit code for Palo Alto Networks zero-day now public (source)
- SoumniBot malware exploits Android bugs to evade detection (source)
- Prompt Hacking, Private GPTs, Zero-Day Exploits and Deepfakes: Report Reveals the Impact of AI on Cyber Security Landscape (source)
- ArcaneDoor hackers exploit Cisco zero-days to breach govt networks (source)
- State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage (source)
- Google fixes Chrome zero-day with in-the-wild exploit (CVE-2024-4671) (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-10-11 | CVE-2019-2215 | Use After Free vulnerability in Google Android A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. | 4.6 |