Check Point today disclosed details about a set of four vulnerabilities affecting 900 million Android smartphones and tablets that use Qualcomm® chipsets. The Check Point mobile threat research team, which calls the set of vulnerabilities QuadRooter, presented its findings in a session at DEF CON 24 in Las Vegas.

What is QuadRooter?
QuadRooter is a set of four vulnerabilities affecting Android devices built using Qualcomm chipsets. Qualcomm is the world’s leading designer of LTE chipsets with a 65% share of the LTE modem baseband market. If any one of the four vulnerabilities is exploited, an attacker can trigger privilege escalations for the purpose of gaining root access to a device.

Learn more: Download our QuadRooter report today.

Some of the latest and most popular Android devices found on the market today use these chipsets, including:

  • BlackBerry Priv
  • Blackphone 1 and Blackphone 2
  • Google Nexus 5X, Nexus 6 and Nexus 6P
  • HTC One, HTC M9 and HTC 10
  • LG G4, LG G5, and LG V10
  • New Moto X by Motorola
  • OnePlus One, OnePlus 2 and OnePlus 3
  • Samsung Galaxy S7 and Samsung S7 Edge
  • Sony Xperia Z Ultra

See if your device is at risk: See scan results like these for your Android device

How are Android devices exposed to this vulnerability?
An attacker can exploit these vulnerabilities using a malicious app. Such an app would require no special permissions to take advantage of these vulnerabilities, alleviating any suspicion users may have when installing.

Learn the technical details of QuadRooter: Download our report today.

What Android devices are at risk?
QuadRooter vulnerabilities are found in software drivers that ship with Qualcomm chipsets. Any Android device built using these chipsets is at risk. The drivers, which control communication between chipset components, become incorporated into Android builds manufacturers develop for their devices.

Since the vulnerable drivers are pre-installed on devices at the point of manufacture, they can only be fixed by installing a patch from the distributor or carrier. Distributors and carriers issuing patches can only do so after receiving fixed driver packs from Qualcomm.

This situation highlights the inherent risks in the Android security model. Critical security updates must pass through the entire supply chain before they can be made available to end users. Once available, the end users must then be sure to install these updates to protect their devices and data.

Protect Your Enterprise   |   Scan Your Personal Device

How can I protect employee’s devices from attacks using these vulnerabilities?
Without an advanced mobile threat detection and mitigation solution on the Android device, there is little chance a user would suspect any malicious behavior has taken place.

What are the risks if an attacker exploits the vulnerability on a device?
If exploited, QuadRooter vulnerabilities can give attackers complete control of devices and unrestricted access to sensitive personal and enterprise data on them. Access could also provide an attacker with capabilities such as keylogging, GPS tracking, and recording video and audio.

How can my employees protect their personal devices from QuadRooter?
Check Point continues to recommend that organizations encourage employees to follow these best practices to help keep Android devices safe from attacks:

  • Download and install the latest Android updates as soon as they become available. These include important security updates that help keep your device and data protected.
  • Understand the risks of rooting your device – either intentionally or as a result of an attack.
  • Examine carefully any app installation request before accepting it to make sure it’s legitimate.
  • Avoid side-loading Android apps (.APK files) or downloading apps from third-party sources. Instead, practice good app hygiene by downloading apps only from Google Play.
  • Read permission requests carefully when installing any apps. Be wary of apps that ask for permissions that seem unusual or unnecessary or that use large amounts of data or battery life.
  • Use known, trusted Wi-Fi networks or while traveling use only those that you can verify are provided by a trustworthy source.
  • End users and enterprises should consider using mobile security solutions designed to detect suspicious behavior on a device, including malware that could be obfuscated within installed apps.

For users who use their personal Android devices for work purposes, Check Point also recommends the following considerations:

  • Enterprises should deploy a mobile security solution that detects and stops advanced mobile threats.
  • Contact your mobility, IT, or security team for more information about how it secures managed devices.
  • Use a personal mobile security solution that monitors your device for any malicious behavior.

Where can I learn more about QuadRooter?
The Check Point mobile threat research team has compiled a report that includes a detailed analysis of each vulnerability and how attackers can exploit these on Android devices. Also available is a free QuadRooter scanner app on Google Play, which can tell you if these vulnerabilities exist on your device.

   Protect Your Enterprise   |   Scan Your Personal Device

  1. Michael Westcott says:

    It would be more useful to say which Qualcomm SoCs are potentially affected by this bug instead of just listing devices…

  2. I’ve just spoken to my phone provider EE about this and they sY they are not aware of the problem and that I’m the only call they’ve had today about it. I read out the article from the BBC website to them. I also down loaded the app to scan for this as advised. It says I have all four viruses. EE said they’ve no update to give me as they have not received any security virus threats. I’m confused.

  3. “Also available is a free QuadRooter scanner app on Google Play”

    I’d specify the name of the app; I can easily see an app exploiting QuadRooter masquerading as a scanner app.

  4. Petteri Järvinen says:

    Samsung S6 and S7 sold in Europe (at least in Finland) seem to be fine, because they use Exynos-chip.

  5. Good news for people who want to root their phones!

    I don’t think anyone in history has been affected by a hacker on their phone outside of celebrity iPhones.

  6. BlackBerry said that their Android devices (priv and dtek50) can not be rooted, because they use hardware Root of Trust for all their devices. So although Priv used Qualcomm chipset but it can not be rooted or effected by this error.

Comments are closed.