• Welcome to Free PC Help, a free PC Help forum to get help with your computer problems.

    Free PC Help is a community that offers free computer help and support for all users, all ages, worldwide.

    In order to start asking questions or contribute on someone else's post you will first need to register. Don't worry - it's quick and easy and once you have registered you will have instant access to the entire forum.

    If you do decide to join the forums you will not have the option to send Private Messages [ PMs ] or add a Signature until you have made 5 posts or more. This is an attempt to try to stop Spammers using the PM system or adding links to their Signature.

LG Smartphones Affected by Two Severe Vulnerabilities

  • Thread starter
  • Admin
  • #1


Admin & Security Team
Feb 19, 2010
Midlands, UK
PC Experience
Very Experienced
One can allow a crook to wipe devices clean

Two researchers from Check Point's mobile security division uncovered two vulnerabilities in LG's custom modification of the Android OS, which enable attackers to take control of the device.

The researchers presented their findings at this year's LayerOne security conference, but not before working with LG to address the issues.

Despite Google's best efforts to secure the Android OS, changes made to the operating system by various OEMs introduced new vulnerabilities unique to those devices alone.
In LG's case, these two vulnerabilities affected one in five mobile devices in the US, according to data from a recent comScore survey.

CVE-2016-3117: Privilege escalation leads to device bricking

The first issue the two presented is a privilege escalation in the Android LG service called LGATCMDService.
The researchers discovered that a malicious app could connect to this service, regardless of its original access privileges and get "atd" user permissions.

An attacker could read or even write new IMEI and MAC addresses, disable the USB connection, reboot the smartphone on demand, wipe a phone's memory, or even brick the device completely.

"Ransomware would find these features very useful by locking a user out of a device and then disabling the ability to retrieve files by connecting the device with a computer via USB," the researchers said.

CVE-2016-2035: SQL injection leads to phishing

The second issue the researchers helped LG fix is as dangerous as the first one and can be found in the WAP Push protocol that's used to send URLs to mobile devices via the SMS protocol.

The two FireEye researchers claim that an SQL injection in the components of this protocol can be used to allow attackers to control the links sent to user devices.

The attacker can push URLs into unread SMS messages and distribute links to malicious apps or credentials-stealing phishing pages.

Top Bottom