Amazon Fire Phone No Secure USB Debugging
- Published: 25 Jun 2015
Share
Type
Severity
Affected products
CVE Reference
19/01/2015 | Reported to Amazon |
04/02/2015 | Amazon confirms reception and validity |
09/03/2015 | MWR requests status and progress |
13/03/2015 | Amazon notifies MWR that implementation of fixes has commenced |
27/03/2015 | Amazon notifies MWR that testing of fixes have commenced |
10/04/2015 | Amazon notifies MWR that testing is almost complete |
01/05/2015 | FireOS 4.6.1 released |
03/05/2015 | Amazon and MWR coordinate public release of advisory |
25/06/2015 | Advisory published |
A vulnerability was discovered within the Amazon Fire Phone USB Debugging functionality. The Modified Android 4.2.2 Operating System running on the Fire Phone was found to not enforce Secure USB Debugging.
Android Debug Bridge (adb) is a command line tool that allows users to perform actions that can assist during development or debugging. This tool allows users to access various functionality and data on a device, including the installation of applications and extraction of information. Secure USB Debugging was added to Android 4.2.2 and onward, to ensure that only a limited number of hosts are able to connect through adb. Addition of hosts to the device’s whitelist requires the device to be unlocked and the user to accept connections via a prompt. However, it was found that the Amazon Fire Phone, which runs a modified Android 4.2.2 Operating System (OS), did not enforce Secure USB Debugging. The vulnerability detailed is only exploitable if USB debugging is enabled on the device.
This allows attackers to gain adb access to the device, which would allow them to:
The device never prompts users to accept new hosts and it is possible to connect via adb even when the device is locked.
Ensure that USB Debugging is disabled on the device.
Users should update to the latest version of Fire OS, as the issue has been addressed in Fire OS 4.6.1.