ZTE Score M Android 2.3.4 backdoor vulnerability

(6 views)

ZTE of China has revealed the existence of a backdoor in its Score M Android 2.3.4 Gingerbread smartphone which would be used for handling the install and uninstall of apps. The root shell backdoor vulnerability was posted on Pastebin. First up, this root shell access is actually used in development by manufacturers, but what is clear is that the backdoor should have been disabled. It does however appear that ZTE and MetroPCS are using this root shell to install and uninstall apps and in particular software updates (otherwise referred to as ‘fragmentation’). ZTE have confirmed the vulnerability on their Score M devices, but it isn’t clear whether the same backdoor affects other mobile phone models. ZTE is working on an OTA (over-the-air) security patch, but hasn’t indicated when this patch will be made available to end users. It’s well known that legitimate Google-supported APIs can open backdoors but actually don’t introduce any....

June 1, 2012
Subscribe
Notify of
guest
1 Comment
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Amanda Franky
5 months ago

A great hacker is really worthy of good recommendation , Henry
really help to get all the evidence i needed against my husband and
and i was able to confront him with this details from this great hacker
to get an amazing service done with the help ,he is good with what he does and the charges are affordable, I think all I owe him is publicity for a great work done via, Henryclarkethicalhacker at g mail com, and you can text, call him on whatsapp him on +12014305865, or +17736092741, 

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.