Skip to main content

Google fixes critical security flaw affecting over 900 million Android devices

BlackBerry is the first major phone maker to patch QuadRooter exploits

quadrooter exploit qualcomm chips android devices flaw
Image used with permission by copyright holder
At the Defcon security conference in Las Vegas last week, Israeli cybersecurity firm Check Point detailed a new bug, dubbed “Quadrooter,” that resides within the firmware of a Qualcomm chip contained in more than 900 million devices.

Now it looks as though Google has addressed the last two flaws that relate to this set of vulnerabilities.

Recommended Videos

Check Point previously said that the vulnerability could, in skilled hands, cede “complete control” of a smartphone or tablet to nefarious programmers. Specifically, it could allow a malicious app to bypass Android’s built-in security measures and grant itself administrative privileges, a level of access that entails the ability to collect “sensitive personal and enterprise data.”

Please enable Javascript to view this content

The flaw required a would-be victim to install a malicious app — infected code posing as a legitimate update, for instance, or a pirated version of a paid application. Crucially, that precluded apps distributed through Google’s Play Store, which Google regularly scans for malware. Apps infected with Quadrooter’s delivery mechanism would have to be installed manually by toggling the “Unknown Applications” setting in Android’s settings menu.

It also likely required that users disable Android’s “Verify Apps” feature, a malware filter that scans for known vulnerabilities in apps — including those installed manually, outside of the Play Store’s walled garden — at installation time.

When the flaw was first unveiled, a Google spokesperson confirmed as much in a statement to Android Central: “We appreciate Check Point’s research as it helps improve the safety of the broader mobile ecosystem. … Exploitation of these issues depends on users also downloading and installing a malicious application. Our Verify Apps and SafetyNet protections help identify, block, and remove applications that exploit vulnerabilities like these.”

Android Central notes that the protection has been enabled by default in all Android versions since 4.2 Jelly Bean in 2012, and that it’s frequently updated with new virus definitions via Google Play Services, the Android framework responsible for delivering Google app updates. Google also conducts security scans of Android phones about “once per week” by default and can, in some cases, uninstall infected applications from handsets remotely.

Check Point discovered four specific vulnerability’s in Qualcomm’s firmware, said Adam Donefeld, the firm’s lead mobile security researcher. The firm hasn’t observed any exploits “in the wild,” as of yet, but expects to “in the next three to four months.” Check Point published a preliminary list of affected devices:

  • BlackBerry Priv
  • Blackphone 1 and Blackphone 2
  • Google Nexus 5X, Nexus 6, and Nexus 6P
  • HTC One, HTC M9, and HTC 10
  • LG G4, LG G5, and LG V10
  • New Moto X by Motorola
  • OnePlus One, OnePlus 2, and OnePlus 3
  • Samsung Galaxy S7 and Samsung S7 Edge
  • Sony Xperia Z Ultra

A Qualcomm spokesperson told ZDNet that it issued patches to “customers, partners, and the open source community” between April and the end of July. Google, for its part, said that “most” of the fixes had been rolled into Android’s monthly security update — the collection of firmware fixes that the company makes available to its Android partners.

Google’s latest fix, issued Tuesday, came after a number of phone makers issued patches of their own.

Sony, for example, says worked its patch into “normal and regular software maintenance, both directly to open-market devices and via our carrier partners, so timings can vary by region and or operator.” Meaning the company isn’t rushing the fix out immediately, according to the Xperia Blog, and knowing how long it takes carriers to update devices, it’s likely that we won’t see this fix in Sony devices for a few months.

Some, though, like BlackBerry, have taken a more proactive approach. The company announced a couple weeks ago that it had issued a patch for the Priv and DTEK50 addressing “three of the four vulnerabilities” uncovered by Check Point. The fourth issue, it said, is “naturally mitigated” by both devices’ secure boot chain. “We don’t think any of our customers are currently at risk from this issue,” Alexa Manea, director of BlackBerry Security, wrote in a blog post. “This is a great example of how our Android platform hardening proactively protects against issues that haven’t even been discovered yet.”

Check Point said the nature of the exploit highlights the difficulty in ensuring that Android devices, oversight of which typically involves at least a handful of parties, remain inoculated against new threats. “This situation highlights the inherent risks in the Android security model,” the firm stated in its report. “Critical security updates must pass through the entire supply chain before they can be made available to end users. Once available, the end user must then be sure to install these updates to protect their devices and data.”

It’s a problem exacerbated when some partners refuse to play ball. Lenovo caused a stir when it implied in a recent statement that the Moto Z, its new flagship phone in the U.S., wouldn’t be receiving monthly security patches. The company has since clarified its stance, but the issue of infrequent, incomplete, or otherwise haphazard security updates has prompted activity at the federal level. The Federal Trade Commission and the Federal Communications Commission are compiling a report, due out later this year, about the decision process involved in “[patching] a vulnerability on a particular mobile device.”

The Quadrooter report follows the discovery of two major Android vulnerabilities in the past year, Stagefright and Fake ID. The former, a fix for which is scheduled for September, tapped into bugged code within Android’s multimedia playback and allowed apps to gain administrative access. The latter, meanwhile, let malicious apps assume the identity of legitimate software. A patch was issued in late July.

This article was originally published on 08-08-2016.

Updated on 08-16-2016 by Kyle Wiggers: Added news about BlackBerry’s patch for the exploit.

Updated on 09-07-2016 by Kyle Wiggers: Added news about Google’s final fixes to the exploit.

Kyle Wiggers
Former Digital Trends Contributor
Kyle Wiggers is a writer, Web designer, and podcaster with an acute interest in all things tech. When not reviewing gadgets…
The OnePlus 13 is coming on January 7 — along with a surprise
The OnePlus logo on the back of the OnePlus Open Apex Edition.

It's official: the OnePlus 13 will launch on January 7, 2025. Preempting the anticipated event by several weeks, OnePlus has officially confirmed the date we’ll see its next major smartphone release outside of China. Additionally, it has revealed some key features and news of a surprise new launch to go along with the phone.

OnePlus will release the OnePlus 13 in three different colors — Black Eclipse, Arctic Dawn, and Midnight Ocean. It’s the latter that is likely to be the model to have, as it is wrapped in a material called micro-fiber vegan leather, which is apparently corrosion and scratch-resistant but still luxurious to the touch. For the Arctic Dawn phone, the glass will have a special coating to give it a silky-smooth finish. It’s likely these are the same colors offered in China, where the phone has already been announced, just with different names.

Read more
I’m really worried about the future of smart glasses
The front of the Ray-Ban Meta smart glasses.

The Ray-Ban Meta smart glasses are among the most interesting, unexpectedly fun, and surprisingly useful wearables I’ve used in 2024. However, as we go into 2025, I’m getting worried about the smart glasses situation.

This isn’t the first time I’ve felt like we’re on the cusp of a new wave of cool smart eyewear products, only to be very disappointed by what came next.
Why the Ray-Ban Meta are so good

Read more
We need to talk about this fantastic, industry-leading Motorola collab
A person holding the Motorola Edge 50 Neo.

We are accustomed to tech brands partnering with adjacent brands, whether it’s OnePlus with Hasselblad or Honor and Huawei with Porsche Design, and often — such as with Xiaomi and Leica — singing the praises of the resulting collaborations. But not enough has been said about Motorola’s now established partnership with color experts Pantone.

It was when the recently released Motorola Edge 50 Neo arrived for me to try out that I finally understood how impactful the collaboration has become. Why? It manages to make even ordinary colors look fantastic.
Boring gray?

Read more