Vulnerabilities > CVE-2013-4787 - Cryptographic Issues vulnerability in Google Android

047910
CVSS 9.3 - CRITICAL
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
google
CWE-310
critical
exploit available

Summary

Android 1.6 Donut through 4.2 Jelly Bean does not properly check cryptographic signatures for applications, which allows attackers to execute arbitrary code via an application package file (APK) that is modified in a way that does not violate the cryptographic signature, probably involving multiple entries in a Zip file with the same name in which one entry is validated but the other entry is installed, aka Android security bug 8219321 and the "Master Key" vulnerability.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Exploit-Db

descriptionGoogle Android 'APK' code Remote Security Bypass Vulnerability. CVE-2013-4787. Remote exploit for android platform
idEDB-ID:38627
last seen2016-02-04
modified2013-07-03
published2013-07-03
reporterBluebox Security
sourcehttps://www.exploit-db.com/download/38627/
titleGoogle Android 'APK' code Remote Security Bypass Vulnerability