A flaw in the Android browser, which Google no longer supports, was recently discovered that allows attackers to...
steal user data from the application. Google already patched the vulnerability for Chrome, which is now the default browser for Android devices, but the Android browser still sits on many devices. What is the best way to mitigate this issue?
Researchers from security firm Rapid7 Inc. found that Android Open Source Project browsers shipped with versions of the operating system prior to Android 4.4 (KitKat) are affected; Google replaced the AOSP browser with its Chrome browser in Android 4.4. This means approximately 75% of the fragmented Android ecosystem is affected, and it appears a fix has only been rolled out for Android 4.1 - 4.3, leaving earlier versions unpatched. Also, other browsers that are based on AOSP's code -- such as Samsung's browser -- also contain this flaw.
Users will have to wait for device vendors to import patches and release firmware updates. The timeframe for this to happen can vary greatly among manufacturers, devices and even countries as local carriers play a role in the distribution of over-the-air updates.
Enterprises should ensure all devices are upgraded to the latest version that doesn't contain the Android browser security vulnerability. Devices that can't be upgraded should be retired and replaced. If this is not an option, install the Chrome browser, as it's not affected. Be sure to make Chrome the default browser for opening links to prevent other apps from using the vulnerable browser which unfortunately can't be uninstalled.
This is a serious vulnerability as it could lead to an attacker stealing session cookies and hijacking a user's session completely, so administrators should look to mitigate this risk as soon as possible.
Ask the Expert:
Perplexed about application security? Send Michael Cobb your questions today. (All questions are anonymous.)
Get SearchSecurity's latest tips and advice on Web browser security.
Dig Deeper on Mobile security threats and prevention
Related Q&A from Michael Cobb
A recently discovered Drupal vulnerability in its open source CMS allowed attackers to control websites. Learn how almost one million sites were ... Continue Reading
Google instituted an aggressive ban on all cryptomining extensions for Chrome after cryptojacking attacks started to become more common. Learn how ... Continue Reading
With enterprises testing DNS over HTTPS to encrypt domain name traffic, some fear the potential privacy issues. Discover the challenges and benefits ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.