This can be exploited through malicious audio files sent via MMS, email, etc. Vulnerable installations have not been found in the wild. However, due to the possibility of remote exploitation, Android Enslaver is classified as an Android threat. User interaction is needed for exploitation.

Another issue with Android kernel is kernel memory corruption due to buffer overflow. This can be exploited for remote code execution. User interaction is needed for exploitation.

CVE-2018-4416 of (TBD) could be exploited via maliciously crafted web-pages. A potential attack scenario would require discreetly delivering a malicious web-page to a targeted user. This could be done through malicious links in social engineering emails, chat messages, etc. Vulnerable installations would not be actively exploited in the wild. However, due to the possibility of remote exploitation, Android Rogue Photo is classified as an Android threat. User interaction is needed for exploitation.

CVE-2018-4417 of (TBD) can be exploited via maliciously crafted media content. A potential attack scenario would require the delivery of specially crafted media content to a targeted user. This could be done through malicious media content in social engineering emails, etc. Vulnerable installations would not be actively exploited in the wild. However, due to the possibility of remote exploitation, Android Hacked Photo is classified as an Android threat. User interaction is needed for exploitation.

Android rooting

Depending on the device, Android rooting can be done through the use of a user-developed app or an OEM unlocking tool. One type of rooting that is possible via user-developed apps is "superuser" apps. These are apps that allow users to gain root access without any special tools and without needing to unlock their devices.

The process of rooting your device varies between manufacturers and models. Many OEMs warn against rooting your device due to warranty concerns and potential issues with the software updates system. Rooting your device removes some security features and can cause issues with the operating system.

Timeline

Published on: 11/17/2022 23:15:00 UTC
Last modified on: 11/22/2022 16:07:00 UTC

References