Missing signs: how several brands forgot to secure a key piece of Android

Open link in next tab

Missing signs: how several brands forgot to secure a key piece of Android

https://rtx.meta.security/exploitation/2024/01/30/Android-vendors-APEX-test-keys.html

We recently discovered that Android devices from multiple major brands sign APEX modules—updatable units of highly-privileged OS code—using private keys from Android’s public source repository. Anyone can forge an APEX update for such a device to gain near-total control over it. Rather than negligence by any particular manufacturer (OEM), we believe that unsafe defaults, poor documentation, and incomplete CTS coverage in the Android Open Source Project (AOSP) were the main causes of this issue.