Android Wi-Fi Direct Vulnerability Lets Hackers to Kick your Devices OFF
Security researchers from Core Security has reportedly found a Denial of Service (DoS) attack vulnerability inAndroid WiFi-Direct.
Android's WiFi-Direct is a wireless technology that allows two devices to establish a direct, peer-to-peer Wi-Fi connection without requiring a wireless router. Smartphones have been able to supportWi-Fi Direct for a while now.
According to the advisory, the remotely exploitable denial-of-service vulnerability is affecting a wide number of Android mobile devices when it scans for WiFi Direct devices. If exploited, the vulnerability would let an attacker force a reboot of a device.
“An attacker could send a specially crafted 802.11 Probe Response frame causing the Dalvik subsystem to reboot because of an Unhandle Exception on WiFiMonitor class,” advisory states.
The Android WiFi-Direct vulnerability (CVE-2014-0997) affects:
- Nexus 5 - Android 4.4.4
- Nexus 4 - Android 4.4.4
- LG D806 - Android 4.2.2
- Samsung SM-T310 - Android 4.2.2
- Motorola RAZR HD - Android 4.1.2
Wi-Fi Direct works much like Bluetooth, just with a longer range and more stability. Devices like printers and wireless mouses can employ Wi-Fi Direct as a direct connection from the computer. Also, if an object has Wi-Fi capabilities, it could also have Wi-Fi Direct, which could allow you to control it with your smartphone in near future.
Andres Blanco from the CoreLabs Team reported the vulnerability to Android Security team and Google classified its as low severity, and they are not much interested to release any patch quickly.
Android Wi-Fi Direct Vulnerability Lets Hackers to Kick your Devices OFF
Reviewed by Unknown
on
5/31/2014
Rating:
No comments:
Post Your Comment Here Please