Home  >  Article  >  Mobile Tutorial  >  Google Pixel series phones have been exposed to security vulnerabilities: they can remotely execute code and install malware

Google Pixel series phones have been exposed to security vulnerabilities: they can remotely execute code and install malware

WBOY
WBOYOriginal
2024-08-21 16:32:25792browse

IT Home News on August 16th, technology blog iVerify published a blog post yesterday (August 15th), reporting that Google Pixel series mobile phones have security vulnerabilities that, if exploited by attackers, can remotely execute code, install malware, etc. Summary of the Vulnerability The vulnerability is rooted in a third-party Android software package called Showcase.apk, developed by Smith Micro to help Verizon set phones in stores into retail demo mode. IT House cited the media report that the application can not only remotely execute code and install software, but also download configuration files through unencrypted HTTP network connections, which means hackers can use this vulnerability to hijack Pixel devices. Verizon no longer uses Showcase, but the APK is still included in the Android version of Google Pixel smartphones. Scope of Impact Google has pre-installed the application on several previous Pixel phones, but the latest Pixel 9 series phones have removed the application and are therefore not affected. Fix Google disclosed the vulnerability in May this year and has not yet fixed it, but Google said it plans to remove the app through an update.

Google Pixel series phones have been exposed to security vulnerabilities: they can remotely execute code and install malware

iVerify believes that the Showcase app may also be embedded on other Android devices. Google said it was notifying other Android manufacturers as a precaution.

The above is the detailed content of Google Pixel series phones have been exposed to security vulnerabilities: they can remotely execute code and install malware. For more information, please follow other related articles on the PHP Chinese website!

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn