Google Android up to 4.2 APK Package Signature cryptographic issue ⚔ [Disputed]
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.3 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Google Android. It has been classified as critical. This impacts an unknown function of the component APK Package Signature Handler. Performing a manipulation results in cryptographic issue. This vulnerability is known as CVE-2013-4787. Furthermore, an exploit is available. This vulnerability is considered historic because of its background and reception. There is ongoing doubt regarding the real existence of this vulnerability. To fix this issue, it is recommended to deploy a patch.
Details
A vulnerability classified as critical has been found in Google Android (Smartphone Operating System). This affects an unknown code block of the component APK Package Signature Handler. The manipulation with an unknown input leads to a cryptographic issue vulnerability. CWE is classifying the issue as CWE-310. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:
Android 1.6 Donut through 4.2 Jelly Bean does not properly check cryptographic signatures for applications, which allows attackers to execute arbitrary code via an application package file (APK) that is modified in a way that does not violate the cryptographic signature, probably involving multiple entries in a Zip file with the same name in which one entry is validated but the other entry is installed, aka Android security bug 8219321 and the "Master Key" vulnerability.
The weakness was published 07/03/2013 by Jeff Forristal with Bluebox Security as Android Security Bug 8219321 as not defined blog post (Website). It is possible to read the advisory at bluebox.com. The public release has been coordinated with Google. The blog post contains:
[A] vulnerability in Android’s security model that allows a hacker to modify APK code without breaking an application’s cryptographic signature, to turn any legitimate application into a malicious Trojan, completely unnoticed by the app store, the phone, or the end user. (…) This vulnerability, around at least since the release of Android 1.6 (codename: “Donut” ), could affect any Android phone released in the last 4 years – or nearly 900 million devices – and depending on the type of application, a hacker can exploit the vulnerability for anything from data theft to creation of a mobile botnet.Technical details of the issue, and related tools/material, will be released as part of a Black Hat USA 2013 talk. This vulnerability is uniquely identified as CVE-2013-4787 since 07/09/2013. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Technical details are unknown but a public exploit is available. The pricing for an exploit might be around USD $0-$5k at the moment (estimation calculated on 06/11/2024). It is expected to see the exploit prices for this product increasing in the near future.The attack technique deployed by this issue is T1600 according to MITRE ATT&CK. Due to its background and reception, this vulnerability has a historic impact. The advisory points out:
All Android applications contain cryptographic signatures, which Android uses to determine if the app is legitimate and to verify that the app hasn’t been tampered with or modified. This vulnerability makes it possible to change an application’s code without affecting the cryptographic signature of the application – essentially allowing a malicious author to trick Android into believing the app is unchanged even if it has been.
A public exploit has been developed by Jeff Forristal and been published 2 months after the advisory. The exploit is shared for download at gist.github.com. It is declared as proof-of-concept. We expect the 0-day to have been worth approximately $25k-$100k. The real existence of this vulnerability is still doubted at the moment. The advisory illustrates:
Installation of a Trojan application from the device manufacturer can grant the application full access to Android system and all applications (and their data) currently installed. The application then not only has the ability to read arbitrary application data on the device (email, SMS messages, documents, etc.), retrieve all stored account & service passwords, it can essentially take over the normal functioning of the phone and control any function thereof (make arbitrary phone calls, send arbitrary SMS messages, turn on the camera, and record calls). Finally, and most unsettling, is the potential for a hacker to take advantage of the always-on, always-connected, and always-moving (therefore hard-to-detect) nature of these “zombie” mobile devices to create a botnet.Working PoCs for major Android device vendors will be made available to coincide with the presentation at Black Hat USA 2013.
Upgrading to version 2013-07-07 eliminates this vulnerability. Applying a patch is able to eliminate this problem. The problem might be mitigated by replacing the product with Apple iOS or Microsoft Windows Phone as an alternative. The best possible mitigation is suggested to be patching the affected component. A possible mitigation has been published even before and not after the disclosure of the vulnerability. The blog post contains the following remark:
It’s up to device manufacturers to produce and release firmware updates for mobile devices (and furthermore for users to install these updates). The availability of these updates will widely vary depending upon the manufacturer and model in question.
The vulnerability is also documented in the databases at X-Force (85500), Exploit-DB (38627), SecurityFocus (BID 60952†), OSVDB (94773†) and Vulnerability Center (SBV-42084†). Further details are available at pcworld.com. Similar entry is available at VDB-9515. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Type
Vendor
Name
Version
- 1.6
- 2.0
- 2.0.1
- 2.1
- 2.2
- 2.2.1
- 2.2.2
- 2.2.3
- 2.3.1
- 2.3.2
- 2.3.3
- 2.3.4
- 2.3.5
- 2.3.6
- 2.3.7
- 3.0
- 3.2.1
- 3.2.2
- 3.2.4
- 3.2.6
- 4.0
- 4.0.1
- 4.0.2
- 4.0.3
- 4.0.4
- 4.1
- 4.1.2
- 4.2
License
Website
- Vendor: https://www.google.com/
CPE 2.3
CPE 2.2
Screenshot

CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 8.1VulDB Meta Temp Score: 7.3
VulDB Base Score: 8.1
VulDB Temp Score: 7.3
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Cryptographic issueCWE: CWE-310
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Author: Jeff Forristal
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Exploit-DB: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Exploit Delay Time: 🔍
Upgrade: Android 2013-07-07
Alternative: Apple iOS/Microsoft Windows Phone
Timeline
02/01/2013 🔍07/03/2013 🔍
07/03/2013 🔍
07/04/2013 🔍
07/09/2013 🔍
07/09/2013 🔍
08/01/2013 🔍
10/24/2013 🔍
06/11/2024 🔍
Sources
Vendor: google.comAdvisory: Android Security Bug 8219321
Researcher: Jeff Forristal
Organization: Bluebox Security
Status: Not defined
Coordinated: 🔍
Disputed: 🔍
CVE: CVE-2013-4787 (🔍)
GCVE (CVE): GCVE-0-2013-4787
GCVE (VulDB): GCVE-100-9315
X-Force: 85500
SecurityFocus: 60952
OSVDB: 94773
Vulnerability Center: 42084 - Google Android 1.6 - 4.2 Remote Code Execution Vulnerability Using Master Key to Change APK Code, Critical
scip Labs: https://www.scip.ch/en/?labs.20150917
Misc.: 🔍
See also: 🔍
Entry
Created: 07/04/2013 11:22Updated: 06/11/2024 11:56
Changes: 07/04/2013 11:22 (70), 05/14/2017 09:34 (18), 06/11/2024 11:56 (17)
Complete: 🔍
Cache ID: 216:926:103
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.