New Blog Post | Android apps with millions of downloads exposed to high-severity vulnerabilities

%3CLINGO-SUB%20id%3D%22lingo-sub-3451602%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20Android%20apps%20with%20millions%20of%20downloads%20exposed%20to%20high-severity%20vulnerabilities%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3451602%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2022%2F05%2F27%2Fandroid-apps-with-millions-of-downloads-exposed-to-high-severity-vulnerabilities%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAndroid%20apps%20with%20millions%20of%20downloads%20exposed%20to%20high-severity%20vulnerabilities%20-%20Microsoft%20Security%20Blog%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMicrosoft%20uncovered%20high-severity%20vulnerabilities%20in%20a%20mobile%20framework%20owned%20by%20mce%20Systems%20and%20used%20by%20multiple%20large%20mobile%20service%20providers%20in%20pre-installed%20Android%20System%20apps%20that%20potentially%20exposed%20users%20to%20remote%20(albeit%20complex)%20or%20local%20attacks.%20The%20vulnerabilities%2C%20which%20affected%20apps%20with%20millions%20of%20downloads%2C%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CEM%20class%3D%22%22%3Ehave%20been%20fixed%20by%20all%20involved%20parties%3C%2FEM%3E.%20Coupled%20with%20the%20extensive%20system%20privileges%20that%20pre-installed%20apps%20have%2C%20these%20vulnerabilities%20could%20have%20been%20attack%20vectors%20for%20attackers%20to%20access%20system%20configuration%20and%20sensitive%20information.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22%22%3EAs%20it%20is%20with%20many%20of%20pre-installed%20or%20default%20applications%20that%20most%20Android%20devices%20come%20with%20these%20days%2C%20some%20of%20the%20affected%20apps%20cannot%20be%20fully%20uninstalled%20or%20disabled%20without%20gaining%20root%20access%20to%20the%20device.%20We%20worked%20with%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.mce.systems%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3Emce%20Systems%3C%2FA%3E%2C%20the%20developer%20of%20the%20framework%2C%20and%20the%20affected%20mobile%20service%20providers%20to%20solve%20these%20issues.%20We%20commend%20the%20quick%20and%20professional%20resolution%20from%20the%20mce%20Systems%20engineering%20teams%2C%20as%20well%20as%20the%20relevant%20providers%20in%20fixing%20each%20of%20these%20issues%2C%20ensuring%20that%20users%20can%20continue%20using%20such%20a%20crucial%20framework.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-3451602%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

Android apps with millions of downloads exposed to high-severity vulnerabilities - Microsoft Securit...

 

Microsoft uncovered high-severity vulnerabilities in a mobile framework owned by mce Systems and used by multiple large mobile service providers in pre-installed Android System apps that potentially exposed users to remote (albeit complex) or local attacks. The vulnerabilities, which affected apps with millions of downloads, have been fixed by all involved parties. Coupled with the extensive system privileges that pre-installed apps have, these vulnerabilities could have been attack vectors for attackers to access system configuration and sensitive information.

 

As it is with many of pre-installed or default applications that most Android devices come with these days, some of the affected apps cannot be fully uninstalled or disabled without gaining root access to the device. We worked with mce Systems, the developer of the framework, and the affected mobile service providers to solve these issues. We commend the quick and professional resolution from the mce Systems engineering teams, as well as the relevant providers in fixing each of these issues, ensuring that users can continue using such a crucial framework.

 

0 Replies