Google has printed its annual 0-day vulnerability report, presenting in-the-wild exploitation stats from 2022 and highlighting a long-standing drawback within the Android platform that elevates the worth and use of disclosed flaws for prolonged durations.
Extra particularly, Google’s report highlights the issue of n-days in Android functioning as 0-days for menace actors.
The issue stems from the complexity of the Android ecosystem, involving a number of steps between the upstream vendor (Google) and the downstream producer (telephone producers), important discrepancies in safety replace intervals between completely different gadget fashions, brief assist durations, accountability mixups, and others points.
A zero-day vulnerability is a software program flaw recognized earlier than a vendor turns into conscious or fixes it, permitting it to be exploited in assaults earlier than a patch is out there. Nonetheless, an n-day vulnerability is one that’s publicly recognized with or and not using a patch.
For instance, if a bug is understood in Android earlier than Google, it’s known as a zero-day. Nonetheless, as soon as Google learns about it, it turns into an n-day, with the n reflecting the variety of days because it turned publicly recognized.
Google warns that attackers can use n-days to assault unpatched units for months, utilizing recognized exploitation strategies or devising their very own, regardless of a patch already being made out there by Google or one other vendor.
That is brought on by patch gaps, the place Google or one other vendor fixes a bug, however it takes months for a tool producer to roll it out in their very own variations of Android.
“These gaps between upstream distributors and downstream producers permit n-days – vulnerabilities which are publicly recognized – to operate as 0-days as a result of no patch is available to the consumer and their solely protection is to cease utilizing the gadget,” explains Google’s report.
“Whereas these gaps exist in most upstream/downstream relationships, they’re extra prevalent and longer in Android.”
N-days as efficient as 0-days
In 2022, many problems with this sort impacted Android, most notably CVE-2022-38181, a vulnerability within the ARM Mali GPU. This flaw was reported to the Android Safety staff in July 2022, deemed as “will not repair,” patched by ARM in October 2022, and at last integrated within the Android April 2023 safety replace.
This flaw was discovered to be exploited within the wild in November 2022, a month after ARM launched a repair.
Exploitation continued unabated till April 2023, when the Android safety replace pushed the repair, a whopping six months after ARM addressed the safety drawback.
- CVE-2022-3038: Sandbox escape flaw in Chrome 105, which was patched in June 2022, but remained unaddressed on vendor browsers based mostly on earlier Chrome variations, like Samsung’s ‘Web Browser.’
- CVE-2022-22706: Flaw within the ARM Mali GPU kernel driver patched by the seller in January 2022.
The 2 flaws have been discovered to be exploited in December 2022 as a part of an assault chain that contaminated Samsung Android units with spy ware.
Samsung launched a safety replace for CVE-2022-22706 in Could 2023, whereas the Android safety replace adopted ARM’s repair on the June 2023 safety replace, recording a staggering 17-month delay.
Even after Google releases the Android safety replace, it takes gadget distributors as much as three months to make the fixes out there for supported fashions, giving attackers one more window of exploitation alternative for particular units.
This patch hole successfully makes an n-day as worthwhile as a zero-day for menace actors who can exploit it on unpatched units. Some might think about these n-days extra helpful than zero-days because the technical particulars have already been printed, probably with proof-of-concept (PoC) exploits, making it simpler for menace actors to abuse them.
The excellent news is that Google’s 2022 exercise abstract reveals that zero-day flaws are down in comparison with 2021, at 41 discovered, whereas probably the most important drop was recorded within the browsers class, which counted 15 flaws final yr (was 26 in 2021).
One other notable discovering is that greater than 40% of the zero-day vulnerabilities found in 2022 have been variants of beforehand reported flaws, as bypassing fixes for recognized flaws is normally simpler than discovering a novel 0-day that may serve on related assault chains.