RAMpage, a critical bug that affects all Android manufactured after 2012

ram page

It seems that today there is no company dedicated to the world of technology that is not free to present any type of system or platform free of failures. On this particular occasion we have to talk about a new critical failure that affects literally every Android phone made from 2012 to the present day.

Without a doubt we are facing a hard blow to the platform, which, remember, is one of the most used throughout the planet due to the great acceptance that, practically since it arrived on the market, it has had by the vast majority of manufacturers of mobile devices. If you want to know more about the vulnerability detected in the famous operating system designed and developed by Google, I invite you to continue with us.

RAMpage, an Android vulnerability that affects millions of phones in the world

Under the name of ram page A huge, quite critical failure appears on the scene that, as we said, affects a large part of the terminals that today are still used practically daily by millions of users. The problem with this vulnerability is none other than the fact that an advanced user can take advantage of an error that allows accessing and modifying private data of the owner of an Android phone through the device's own RAM memory modules.

Going into a little more detail, tell you that the RAMpage bug has been discovered by a group of researchers made up of eight members who, as they have shown, have managed to create an exploit capable of making use of this vulnerability in an LG G4. As stated in e. statement that they have launched, apparently any terminal manufactured from 2012 to today is potentially exposed to this error of the operating system itself, an error that is not typical of a specific terminal since it is not a hardware problem.

Google should be working today on a solution for RAMpage

This is precisely the fact that this error is not due to the hardware created by a certain manufacturer, which means that literally millions of terminals are exposed to this critical error. It is also true that, because it is due to a failure in the operating system itself designed by Google, it can be corrected in a predictably fast way by launching a security update. As the researchers in charge of making RAMpage public have commented:

RAMpage breaks the most fundamental isolation between user applications and the operating system. While applications generally do not have permission to read data from other applications, a malicious program can create a RAMpage exploit to gain administrative control and seize the secrets stored on the device.

failure

There are no reports that RAMpage is causing havoc among users

As reported by the group of researchers who discovered this critical Android flaw, apparently RAMpage should be taken much more seriously than we usually do with these types of problems., sometimes due to its frequency. A knowledgeable user can compromise passwords, personal photos, e-mail messages, messages in applications and even more sensitive documents stored in the terminal.

I say that you have to be very careful with this vulnerability because, apparently, There is currently no security solution available from Google that is able to end this problem. For now, all we know is that the researchers have already informed the American company and, hopefully for the sake of millions of users, that a solution to this problem can arrive as soon as possible.

Perhaps and as a positive part we find that, at least for the moment, there are no reports that there may be attacks that have existed in a scenario beyond the one performed in the demo test by the team of researchers who discovered RAMpage, so we are not facing a security breach that is causing havoc among users.


Be the first to comment

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.