Especialistas em segurança do Google Android descobriram uma vulnerabilidade crítica de escalonamento de privilégios em alguns dispositivos portáteis baseados no Android da Honeywell que poderiam ser explorados por um invasor para obter privilégios elevados.
According to the vendor, Honeywell handheld computers combine the advantages of consumer PDAs and high-end industrial mobile computers into a single rugged package.
Os dispositivos fornecem conectividade aprimorada, incluindo 802.11x, compatibilidade Cisco e Bluetooth. Eles são amplamente adotados em muitos setores, incluindo energia, assistência médica, industria crítica e instalações comerciais.
O ICS-CERT dos EUA publicou um alerta de segurança para informar sobre a vulnerabilidade que afeta vários modelos de computadores portateis Android Honeywell, incluindo as séries CT60, CN80, CT40, CK75, CN75, CT50, D75e, CN51 e EDA.
Os dispositivos afetados executam várias versões do Android entre 4.4 e 8.1.
“A vulnerability in a system service on CT60, CN80, CT40, CK75, CN75, CT50, D75e, CN51, and EDA series mobile computers running the Android Operating System (OS) could allow a malicious third-party application to gain elevated privileges.” reads the advisory published by the US ICS-CERT.
“A skilled attacker with advanced knowledge of the target system could exploit this vulnerability by creating an application that would successfully bind to the service and gain elevated system privileges.” continues the advisory.
“This could enable the attacker to obtain access to keystrokes, passwords, personal identifiable information, photos, emails, or business-critical documents.”
Pedro Tavares is a professional in the field of information security working as an Ethical Hacker/Pentester, Malware Researcher and also a Security Evangelist. He is also a founding member at CSIRT.UBI and Editor-in-Chief of the security computer blog seguranca-informatica.pt.
In recent years he has invested in the field of information security, exploring and analyzing a wide range of topics, such as pentesting (Kali Linux), malware, exploitation, hacking, IoT and security in Active Directory networks. He is also Freelance Writer (Infosec. Resources Institute and Cyber Defense Magazine) and developer of the 0xSI_f33d – a feed that compiles phishing and malware campaigns targeting Portuguese citizens.
Read more here.