Many Android devices may still be vulnerable if operators haven't sent out updates More fixes are appearing for a pair of highly dangerous vulnerabilities exposed earlier this month in the Android mobile operating system.Security vendor Webroot and ReKey, a collaboration between Northeastern University in Boston and vendor Duo Security, released software on Tuesday that detects if an Android device is vulnerable and applies a patch.Google, which manages the open-source Android project, quickly issued patches for the so-called “master key” vulnerabilities, one of which was found by Bluebox Security and another one that appeared on a Chinese-language forum.But mobile phone manufacturers and operators are often very slow in releasing patches to their users, a problem that is likely to become more critical as mobile device use rises. The result is a large number of users running vulnerable devices. More than 156 million Android smartphones were sold in the first three months of this year worldwide, amounting to a 74 percent market share, according to analyst Gartner.The vulnerability found by Bluebox may affect more 900 million devices made over the last four years running Android versions 1.6 and higher. The vulnerabilities are particularly dangerous since they allow an attacker to modify an Android package file, which is used to install an application, without affecting its original cryptographic signature.The signature is generated by the application’s author and is used to verify the program’s integrity. By using the vulnerability and maliciously modifying an application, a hacker could gain complete control over an Android device.ReKey is an application that applies the Google patches. It also will alert users if an application tries to install itself using the vulnerabilities. ReKey needs root access to a device, which is normally not granted to most applications, in order to patch vulnerabilities.Webroot wrote on Tuesday that it has deployed a patch within its SecureAnywhere Mobile product, which also covers Android’s Jelly Bean 4.1 and Ice Cream Sandwich releases.Bluebox also has an application that detects if a device is vulnerable and scans for malicious applications.In order to protect users, Google is scanning applications in its Play store to ensure those programs are legitimate. Android also has a feature, called “Verify Apps,” which allows Google to vet applications before installation. Application markets and websites not run by Google have posed a risk for Android users. Security researchers have found numerous examples of popular applications that have been modified to deliver secret code that can spy on users.Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk Related content news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Advanced Persistent Threats Advanced Persistent Threats brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities feature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem. By Chris Hughes Sep 21, 2023 8 mins Zero Trust Threat and Vulnerability Management Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe