May 23, 2017 by

Android, Linux Vulnerabilities Dominate the US-CERT Bulletin this Week

The most recent vulnerability summary bulletin by the Department of Homeland Security’s US-CERT (Computer Emergency Readiness Team) highlights a number of ‘high severity’ vulnerabilities on mobile platform Android and open-source operating system Linux.

Every week, the US-CERT provides a summary of new risks and vulnerabilities that plague popular software platforms. These vulnerabilities are recorded by the National Institute of Standards and Technology (NIST) and The National Vulnerability Database (NVD). The NVD is notably sponsored and backed by the Department of Homeland Security’s National Cybersecurity and Communications Integration Center (NCCIC).

The bulletin ranks vulnerabilities on a three-tier scoring system. They are ‘High’, ‘Medium’ and ‘Low’ vulnerabilities. The high-risk vulnerabilities see a Common Vulnerability Scoring System (CVSS) score of 7.0- 10.0 (the most critical score).

A total of 25 Android vulnerabilities made the high-risk vulnerabilities chart. Three of those were rated critically high at 9.3 each due to the possibility of a permanent device compromise. The only way to redeem the device in such a scenario would be to reflash the ROM/operating system in the Android phone or tablet.

These severe vulnerabilities surfaced in the MediaTek touchscreen and thermal drivers, as well as Qualcomm’s bootloader, both of whom are third-party manufacturers developing solutions for the Android ecosystem.

One of them, tagged CVE-2016-10274, reads as:

An elevation of privilege vulnerability in the MediaTek touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel.

A number of exploits that allowed remote code execution were also rated at 9.3. Suffice to say, Android topped the charts in being the most vulnerable commercial software platform this week.

The Linux kernel saw two high-severity vulnerabilities rated above 9, one of which would allow a permanent device compromise due to a security hole in the kernel trace subsystem.

The complete bulletin can be found here.

Image credit: Wikimedia.

About the author

Image of Author

LIFARS is the global leader in Digital Forensics and Cyber Resiliency Services. Our experience spans two decades working on high profile events, often in concert with Law Enforcement Agencies around the world. Our proprietary methodology derives directly and indirectly from our experience working with and for U.S. Intelligence Agencies, Interpol, Europol, and NATO. We are solely dedicated to Cyber Resiliency and thus pay close attention to all aspects of our clients’ engagements experience while providing a strategic and integrated array of services to minimum risk and disruption while protecting your brand.

Related articles

US Homeland Security Team Remotely Hacked a Boeing 757

A Department of Homeland Security (DHS) official has admitted that he and a team of experts remotely...

Read more arrow_forward

US Govt Warns Energy, Aviation Companies of Cybersecurity Threats

The US government has reportedly issued a rare public warning about targeted hacking campaigns...

Read more arrow_forward

Homeland Security Issues Threat Alert for WannaCry Ransomware

The first global ransomware campaign that disrupted several organizations including hospitals across...

Read more arrow_forward