> In terms of the origins of the app, Google told me “this is not an Android platform nor Pixel vulnerability, this is an apk developed by Smith Micro for Verizon in-store demo devices and is no longer being used. Exploitation of this app on a user phone requires both physical access to the device and the user's password.”
If an attacker has your phone and your password, it's game over anyway, who cares if some random app could allow MITM connections over HTTP.
> Google assured me it is taking action, telling me that “out of an abundance of precaution, we will be removing this from all supported in-market Pixel devices with an upcoming Pixel software update. The app is not present on Pixel 9 series devices.” And while iVerify’s report focused on Pixel, Google also said it is “notifying other Android OEMs.”
Just as I saw this HN thread and started reading the article, I also noticed on my Pixel 8 phone had an Android 14 update (the "August 5th, 2024" update) which included this security patch: https://source.android.com/docs/security/bulletin/pixel/2024...
It includes 1 CVE patch for Pixel: CVE-2024-32927, which has a "high" severity and is an "Elevation of privilege" type. Android Bug ID: 312268456*.
When you look up the CVE is has no details, and the asterisk next to the Android Bug ID means that it's not publicly available[1]. This article just posted today but I wonder when the research and interviews for the article happened. Maybe the August patch includes the fix, or maybe it'll be the next one.
2. The app is disabled by default ("The app is not enabled by default, but there might be multiple methods to enable it. The iVerify research team investigated one method requiring physical access")
TLDR: Verizon store demo app with a variety of system privileges was downloading payloads over http and was not performing any authentication on what it received.
Not Google’s fault (beyond trusting carriers to not be incompetent :D)
If an attacker has your phone and your password, it's game over anyway, who cares if some random app could allow MITM connections over HTTP.