Android KitKat L / 5.0 Now? Hackers Could Steal Info if Using 4.3 on Nexus 5, Nexus 7, Nexus 10, Nexus 4; Researchers Say

Android KitKat L / 5.0 Now? Hackers Could Steal Info if Using 4.3 on Nexus 5, Nexus 7, Nexus 10, Nexus 4; Researchers Say
Android 4.4.4 KitKat has rolled out for a number of devices in the past few weeks, but some users are complaining there's bugs that still need to be ironed out. The update was released for several devices just days after Android 4.4.3 KitKat came out. A photo of Google's new Android mascot - in KitKat flavor. (Courtesy Google)
Jack Phillips
6/30/2014
Updated:
7/18/2015

Researchers with IBM have said smartphone users not running the Android 4.4 KitKat OS are more open to vulnerabilities.

IBM went public and said there’s critical security vulnerabilities in Android version 4.3. The bug was discovered about nine months ago but IBM made their findings public on Monday, according to security expert Graham Cluley.

“The vulnerability affects Android 4.3 only. Thanks for the Android Security Team for correcting our advisory,” the researchers wrote on an IBM website, Security Intelligence.

“Nine months ago, my team came across a classic stack-based buffer overflow in the Android KeyStore service,” it said. “As always, we adhered to our responsible disclosure policy and privately reported this issue to the Android Security Team; the result is a patch that is now available in KitKat. Considering Android’s fragmented nature and the fact that this was a code-execution vulnerability, we decided to wait a bit with the public disclosure.”

The website notes there are difficulties that exist in how Android rolls out patches.

“Considering Android’s fragmented nature and the fact that this was a code-execution vulnerability, we decided to wait a bit with the public disclosure,” the website writes.

Security Intelligence posted a run-down of the problems:

“Leak the device’s lock credentials. Since the master key is derived by the lock credentials, whenever the device is unlocked, ‘Android::KeyStoreProxy::password’ is called with the credentials.

Leak decrypted master keys, data and hardware-backed key identifiers from the memory.

Leak encrypted master keys, data and hardware-backed key identifiers from the disk for an offline attack.

Interact with the hardware-backed storage and perform crypto operations (e.g., arbitrary data signing) on behalf of the user.”

According to a recent report, Google said only 13.6 percent of all Android users are running KitKat. The majority of users are running Jelly Bean, which encompasses 4.1 to 4.3.

Jack Phillips is a breaking news reporter with 15 years experience who started as a local New York City reporter. Having joined The Epoch Times' news team in 2009, Jack was born and raised near Modesto in California's Central Valley. Follow him on X: https://twitter.com/jackphillips5
twitter