Many Google Pixel devices shipped since September 2017 have included dormant software that could be exploited by attackers to compromise them. Researchers form mobile security firm iVerify reported that the issue stems from a pre-installed Android app called “Showcase.apk,” which runs with excessive system privileges, allowing it to remotely execute code and install remote package.<\/p>\n\n\n\n
“iVerify discovered an Android package, “Showcase.apk,” with excessive system privileges, including remote code execution and remote package installation capabilities, on a very large percentage of Pixel devices shipped worldwide since September 2017.” reads the report<\/a>. “The application downloads a configuration file over an unsecure connection and can be manipulated to execute code at the system level”<\/em>
The flawed app is called\u00a0Verizon Retail Demo Mode<\/a>\u00a0(“com.customermobile.preload.vzw”) and requires<\/a>\u00a0dozens of permissions for its execution.
The app has been present since August 2016 [1<\/a>, 2<\/a>], but there is no evidence that this vulnerability has been exploited in the wild.
Google is also notifying other Android OEMs.<\/p>\n\n\n\n
“The Showcase.apk discovery and other high-profile incidents, like running third-party kernel extensions in\u00a0Microsoft Windows<\/a>, highlight the need for more transparency and discussion around having third-party apps running as part of the operating system. It also demonstrates the need for quality assurance and penetration testing to ensure the safety of third-party apps installed on millions of devices.” concludes the report. “Further, why Google installs a third-party application on every Pixel device when only a very small number of devices would need the Showcase.apk is unknown. The concern is serious enough that Palantir Technologies, who helped identify the security issue, is opting to remove Android devices from its mobile fleet and transition entirely to Apple devices over the next few years.”<\/em><\/p>\n\n\n\n
Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/p>\n\n\n\n
Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n
(<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking, Android)<\/strong><\/p>\n\n\n\n