• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
microsoft finds critical bugs in pre installed apps on millions of

Microsoft Finds Critical Bugs in Pre-Installed Apps on Millions of Android Devices

You are here: Home / General Cyber Security News / Microsoft Finds Critical Bugs in Pre-Installed Apps on Millions of Android Devices
May 28, 2022

4 substantial severity vulnerabilities have been disclosed in a framework utilized by pre-set up Android Process applications with millions of downloads.

The issues, now fastened by its Israeli developer MCE Methods, could have probably permitted threat actors to stage remote and neighborhood attacks or be abused as vectors to get hold of sensitive information and facts by getting benefit of their comprehensive process privileges.

“As it is with a lot of of pre-put in or default programs that most Android equipment occur with these times, some of the afflicted applications can’t be thoroughly uninstalled or disabled devoid of getting root obtain to the unit,” the Microsoft 365 Defender Investigate Staff claimed in a report printed Friday.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


CyberSecurity

The weaknesses, which array from command-injection to regional privilege escalation, have been assigned the identifiers CVE-2021-42598, CVE-2021-42599, CVE-2021-42600, and CVE-2021-42601, with CVSS scores amongst 7. and 8.9.

Command injection proof-of-concept (POC) exploit codeInjecting a equivalent JavaScript code to the WebView

The vulnerabilities had been identified and noted in September 2021 and there is no evidence that the shortcomings are staying exploited in the wild.

Microsoft didn’t disclose the comprehensive record of applications that use the vulnerable framework in question, which is designed to present self-diagnostic mechanisms to determine and repair issues impacting an Android gadget.

This also intended that the framework had wide accessibility permissions, together with that of audio, camera, power, site, sensor details, and storage, to carry out its features. Coupled with the issues identified in the services, Microsoft stated it could allow an attacker to implant persistent backdoors and take about control.

CyberSecurity

Some of the affected applications are from significant worldwide cell service suppliers this sort of as Telus, AT&T, Rogers, Liberty Cell, and Bell Canada –

  • Cellular Klinik Product Checkup (com.telus.checkup)
  • Machine Enable (com.att.dh)
  • MyRogers (com.fivemobile.myaccount)
  • Independence System Care (com.liberty.mlp.uat), and
  • Product Content material Transfer (com.ca.bell.contenttransfer)

On top of that, Microsoft is recommending consumers to look out for the app package deal “com.mce.mceiotraceagent” — an app that might have been mounted by mobile phone restore shops — and get rid of it from the phones, if discovered.

The inclined applications, though pre-mounted by the phone companies, are also out there on the Google Perform Store and are claimed to have passed the app storefront’s automatic safety checks without having increasing any red flags mainly because the course of action was not engineered to glance out for these issues, some thing that has since been rectified.

Identified this posting intriguing? Observe THN on Facebook, Twitter  and LinkedIn to read extra distinctive content material we article.


Some elements of this report are sourced from:
thehackernews.com

Previous Post: «Cyber Security News CISA Publishes 5G Security Evaluation Process Plan
Next Post: New York Man Sentenced to 4 Years in Transnational Cybercrime Scheme new york man sentenced to 4 years in transnational cybercrime»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.