The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned today of a high-severity Android vulnerability believed to have been exploited by a Chinese e-commerce app Pinduoduo as a zero-day to spy on its users.
This Android Framework security flaw (tracked as CVE-2023-20963) allows attackers to escalate privileges on unpatched Android devices without requiring user interaction.
“Android Framework contains an unspecified vulnerability that allows for privilege escalation after updating an app to a higher Target SDK with no additional execution privileges needed,” CISA explains.
Google addressed the bug in security updates released in early March, saying that “there are indications that CVE-2023-20963 may be under limited, targeted exploitation.”
On March 21, Google suspended the official shopping app of Chinese online retailer giant Pinduoduo (which claims to have over 750 million monthly active users) from the Play Store after discovering malware in off-Play versions of the app, tagging it as a harmful app and warning users that it could allow “unauthorized access” to their data or device.
Days later, Kaspersky researchers also revealed they had found versions of the app exploiting Android vulnerabilities (one of them CVE-2023-20963 according to Ars Technica) for privilege escalation and installing additional modules designed to spy on users.
“Some versions of the Pinduoduo app contained malicious code, which exploited known Android vulnerabilities to escalate privileges, download and execute additional malicious modules, some of which also gained access to users’ notifications and files,” Kaspersky security researcher Igor Golovin told Bloomberg.
Federal agencies ordered to patch within three weeks
U.S. Federal Civilian Executive Branch Agencies (FCEB) agencies have until May 4th to secure their devices against the CVE-2023-20963 vulnerability added by CISA to its list of Known Exploited Vulnerabilities on Thursday.
According to the binding operational directive (BOD 22-01) from November 2021, federal agencies must check and fix their networks for all security flaws included in CISA’s KEV catalog.
Even if the catalog is mainly aimed at U.S. federal agencies, it is strongly advised that private companies also treat vulnerabilities in CISA’s catalog with priority.
“These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise,” the U.S. cybersecurity agency said.
On Monday, CISA also ordered federal agencies to patch iPhones and Macs against two security vulnerabilities exploited in the wild as zero-day by May 1st.
Source: https://www.bleepingcomputer.com/news/security/cisa-warns-of-android-bug-exploited-by-chinese-app-to-spy-on-users/