After Stagefright, now Android 5.x Lollipop's turn presents one more vulnerability: how about having your device stolen, and because you decided to add a lock password on your device, anyone who has read this article can access all of your data with a little patience and no help from other software? Find out the causes of this bug and how you can defend against this type of attack.
The problem only happens on devices that have a lock password, if you unlock the screen with any other screen lock function, you will be hassle free. Another point to consider is that your smartphone needs to run on Android version 5.x Lollipop before updating to "LMY48M".
That said, attacks happen through software bugs that allow anyone to unlock their device by completely ignoring their personal password. From the video below we can see that with a little patience it is possible to add a very long sequence of numbers to the password field on the lock screen and with the camera app already open on the lockscreen, Just go to the settings menu and add a long password so that after a few minutes the screen is automatically unlocked and your data is accessible to anyone. Finally, access the developer settings, enable USB debugging. Watch the video where you can see the action attack (strong scenes):
This vulnerability has already been fixed for the "LMY48M" version of Android 5.1.1 after Google released the corrective update for Nexus 4, 5, 6, 7, 9, and 10. However, if you have not received such a patch yet. patch For security reasons, your smartphone probably has this bug, even rooted devices are subject to such vulnerability.
According to the staff of the ArstechnicaAs the bug was introduced in Android Lollipop, the number of handsets affected only a small fraction of Android's user base. If you have not received the security update yet, the solution will use a PIN or default as a screen lock. I tested on Xperia Z2 and Moto X Play, neither of them had the bug. And your device?
. (tagsToTranslate) security alert (t) android 5.x lollipop (t) dialer stock (t) bug android