Americas

  • United States

Asia

JR Raphael
Contributing Editor

The 5 true takeaways from Android’s camera vulnerability circus

news analysis
Nov 21, 20196 mins
AndroidEnterprise ApplicationsMobile

Are sophisticated attackers hijacking your phone's camera and stealing your most precious secrets? Um, yeah — about that....

I don’t know if you’ve read much news this week, but it seems the sky is falling and we’re all terribly doomed.

No, I’m not talking about that news — as usual, that’s another column for another publication — but rather the news that a security flaw in some Android camera apps could turn our phones into privacy-plundering spy portals and bring an end to human life as we know it.

I mean, have you seen some of these headlines?!

  • “Hundreds of millions of Android phone cameras can be hijacked by spyware”
  • “Android flaw lets rogue apps take photos, record video even if your phone is locked”
  • “An Android flaw lets apps secretly access people’s cameras and upload the videos to an external server”

Holy hibiscus, Henry! Even I’m trembling from all of that, and I know it’s a bunch of misguided, sensationalized hooey.

Let’s back up for a sec and provide some context to all of this: A company called Checkmarx (one guess how it makes its money) released a report this week detailing a vulnerability it found in certain Android device-makers’ camera applications. That weakness allowed the firm’s researchers to create an app that could capture and collect photos from a phone without its owner’s consent. And, yes, that vulnerability could have affected hundreds of millions of people.

As usual with these sorts of stories, though, there are some big, juicy buts involved. And those ample, glistening buts are key to understanding what this story really tells us, what we should take away from it, and — critically — why we shouldn’t be cowering in carefully covered bunkers until further notice.

Let’s break it down, shall we?

1. The app at the center of all this was a proof-of-concept creation, with no known real-world implementation.

Before you soil those beautiful britches of yours, remember first and foremost that this whole thing was a security company’s demonstration — an act of researchers actively seeking out a vulnerability to exploit and, y’know, also then use to promote their own product (funny how that always works out, isn’t it?).

It was not, as far as anyone is aware, an actual act of data being stolen in the real world.

2. That aside, the setup would have required you to download and install a random (theoretical) app in order to operate.

This isn’t a situation where your phone would just suddenly start spewing out personal photos to some random server in the Caspian Sea. (Those sea-dwelling mermaid-servers are the worst, aren’t they?) The vulnerability in the camera apps was exploitable only through careful manipulation conducted by a secondary app — something explicitly created for that purpose and something you’d have to go out of your way to download and install before it could do any damage.

Such an app never actually existed, outside of this controlled experiment. And even if it did, again, you’d have to download it before it could do anything.

3. The vulnerability was reported to Google and Samsung, both of whom promptly patched the bug.

After discovering this prickly porcupine of a problem, the Checkmarx chums passed the heaping pot of goulash over to Google — and soon after also to Samsung, as it was discovered its camera app was also affected. Both companies worked to correct the code in question and have since reportedly rolled out patches to fix the flaw.

As for that bit about “hundreds of millions” of phones being affected? Yeah, that was referring to the Samsung phones — which, again, had been patched by the time this whole thing became public. Contrary to what some lazy, sensational headlines are suggesting, there’s nothing to indicate that hundreds of millions of people are actively at risk from this in any way.

4. This is exactly how security should force software to evolve.

Any software — desktop operating systems, mobile operating systems, apps on any platform, you name it — is inherently imperfect. That’s the nature of the beast; vulnerabilities are always gonna come up, whether the software is controlled by Google, Samsung, Apple, or anyone else imaginable.

That, in fact, is why so many companies actively seek out and sometimes even pay people to hunt for security flaws in their software — so they can find ’em, fix ’em, and continue to strengthen their programs. (Google is doing just that today, in fact, with its just-announced expansion of its Android Security Rewards program, now with a maximum prize of $1.5 million for anyone who uncovers a particularly problematic bug.) It’s a never-ending evolution, and it’s the same story for Google as it is for every major software company.

What ultimately matters is that the company in question responds to issues that are identified and then patches them promptly — ideally before any real damage is done. And that’s precisely what we’re seeing play out in this scenario.

5. This is a reminder of why timely updates matter — and why you shouldn’t use phones from companies that don’t provide ’em.

While Google and especially Samsung were called out as being the primary concerns from this problem, Checkmarx says the vulnerabilities it uncovered could potentially impact the camera apps on other phone-makers’ devices — and that “multiple vendors were contacted” with the same information more than a month ago.

Now, again, remember what we just talked about: There’s no reason to believe any phone is in any sort of imminent, realistic danger from this. But, clearly, this isn’t the sort of vulnerability — theoretical and download-requiring as it may be — that you’d want to leave present on your personal technology.

More than anything, then, this serves as a strong reminder of just how important it is to have a phone whose manufacturer actually takes security seriously and sends out timely updates, not only in app-specific situations like this but also when it comes to Android’s monthly patches — which address similar sorts of flaws on a system level — and Android OS updates, which include countless privacy and security improvements and are about much more than just fresh paint and features.

If you aren’t using a phone whose manufacturer consistently delivers on all those fronts (and, let’s be honest, there aren’t many device-makers that do), you’re opting yourself in to less-than-optimal security in exchange for, what? Some flashy hardware, maybe, or a brand name you’ve bought into before? And, as always, it’s hard to see how that’s in any way advisable, especially when excellent update-friendly options are readily available for as little as a few hundred bucks.

But still, all things in perspective: The sky isn’t falling, Chicken Little — and whatever fascinating sights might be seen through your phone’s camera lens are, in all likelihood, not being secretly recorded or shared with any would-be voyeurs pining for a peep.

A little critical thinking and a few simple questions go a long way when it comes to getting past the melodramatic headline hype in situations like this. And, as this latest foofaraw reminds us, there’s rarely a cause for panic — no matter how sensational a scare may initially seem.

Sign up for my weekly newsletter to get more practical tips, personal recommendations, and plain-English perspective on the news that matters.

AI Newsletter

[Android Intelligence videos at Computerworld]

JR Raphael
Contributing Editor

JR Raphael has been covering Android and ChromeOS since their earliest days. You can ingest his advice and insight in his long-standing Android Intelligence column at Computerworld and get even more tasty tech knowledge with his free Android Intelligence newsletter at The Intelligence.

More from this author