Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Android
    • Android
    • Cybersecurity
    • Mobile

    Slow Android Phone Patching Prompts Vulnerability Report

    By
    Robert Lemos
    -
    March 25, 2013
    Share
    Facebook
    Twitter
    Linkedin

      A security researcher disclosed vulnerabilities in Samsung smartphones this week with the intention of highlighting the slow rate at which flaws are fixed in mobile devices.

      In a March 19 blog post, security researcher Roberto Paleari described four vulnerabilities found in various Samsung devices based on the Android operating system. The researcher informed Samsung of the issues in early January, but decided to publicly disclose the vulnerabilities because the device manufacturer intended to wait until all network carriers approved the patch, which “seems to be a very, VERY, long time,” Paleari said.

      While most researchers and security firms allow software makers at least 90 days to develop and deploy a patch, he disclosed early, instead choosing to withhold the technical details of the flaws.

      “I really think Samsung cares about the security of its customers, but probably its vulnerability-handling procedure should be revised a little bit,” Paleari stated in the blog post. “Android malware is … rapidly growing. In this situation, the prompt development and diffusion of security patches is simply mandatory.”

      Paleari emphasized that the vulnerabilities are in Samsung’s modifications to the Android operating system, not the core operating system itself. In response to an email from eWEEK, Samsung did not give a timetable for fixing the vulnerabilities, but said a patch would come soon.

      “Samsung considers user privacy and the security of user data its top priority,” the company stated in the email. “We are aware of this issue and will release a fix at the earliest possibility.”

      Two of the vulnerabilities could allow an attacker to install highly privileged applications without requiring any action on the part of the user. A third issue allows an attacker to take almost any action on a phone, while the fourth allows an attacker to send a Short Message Service (SMS) communication. A variety of other issues could allow a malicious program to change different settings on the victim’s phone.

      The vulnerabilities did not take a great amount of technical knowledge to find. Paleari theorized that malware authors may have already found some of them.

      “Considering that most of these bugs can be fixed quite easily, without any drastic change to the device software, I admit that I was expecting a quick patch from Samsung,” he said.

      The main problem is that the patch process for any mobile device that uses a cellular network is fairly complicated. First, a patch for the vulnerability must be created by the software maker, whether that developer is Google, who manages the core operating system, an open-source project or the device manufacturer. Next, the device manufacturer must rebuild the firmware for each device model, to incorporate the changes, and then test each variation. Finally, the cellular carrier must approve the firmware to make sure it will not cause any disruption.

      The entire process takes months, resulting in most users’ phones having unpatched vulnerabilities. Only 20 percent of Android phones, for example, are running the latest version of the operating system, known as Jelly Bean.

      Robert Lemos
      Robert Lemos is an award-winning freelance journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×