

- #MICRO ANDROID SHAREIT PLAY APK#
- #MICRO ANDROID SHAREIT PLAY CODE#
- #MICRO ANDROID SHAREIT PLAY DOWNLOAD#
“Remote Code Execution (RCE) vulnerabilities are amongst the most critical in terms of risk, as they can lead to total compromise of the device on which they are present. See More: An Old Vulnerability Plagues 8% of Android Apps: Check PointĬommenting on the discovery of multiple high-severity flaws in the SHAREit Android app, Michael Barragry, operations lead at Edgescan, told Toolbox that it’s disappointing that the application developers failed to fix these issues after such a long period, especially given the severity of the issues.
#MICRO ANDROID SHAREIT PLAY DOWNLOAD#
While the app allows the transfer and download of various file types, such as Android Package (APK), the vulnerabilities related to these features are most likely unintended flaws.” “In the past, vulnerabilities that can be used to download and steal files from users’ devices have also been associated with the app. They can also potentially lead to Remote Code Execution (RCE),” the researchers said. “The vulnerabilities can be abused to leak a user’s sensitive data and execute arbitrary code with SHAREit permissions by using a malicious code or app.

#MICRO ANDROID SHAREIT PLAY APK#
The vulnerabilities also allow an attacker to carry out man-in-the-middle attack by downloading and installing malicious APK files from an arbitrary URL, invoking RCE of arbitrary code etc. What’s more is that the external app data and the download directory are unencrypted and can be easily modified by hackers when conducting man-in-the-disk attacks. SHAREit’s Android app, in which the flaws were discovered, requests a number of privacy-invasive permissions from mobile users such as location, camera, storage, Wi-Fi connection information, contacts, microphone, photos/media/files, device & app history, device ID & call information, phone, and other mobile device permissions.Īccording to Trend Micro, vulnerabilities in SHAREit exist due to improperly set up app code access protocols that expose its internal (non-public) as well as external app activities, download directory, and gives a third-party entity with temporary read/write access to the all device data within the /data/data/ folder. See Also: Popular WhatsApp Alternatives Found Harboring Serious Privacy Flaws The app has been downloaded more than a billion times from the Android Play Store, and boasts at least 500 million daily active users across platforms. Ltd., SHAREit enables users to transfer various kinds of files including Android application packages (apk). Owned by Singapore-based tech giant Smart Media4U Technology Pte. Besides the inherent risk of remote code execution (RCE), vulnerabilities in SHAREit can also lead to man-in-the-middle, and man-in-the-disk attacks. “We reported these vulnerabilities to the vendor, who has not responded yet,” wrote senior engineers Echo Duan and Jesse Chang at Trend Micro, detailing how the exploitation of these security flaws could allow the execution of malicious code where the app is located on the device. In a blog post published this week, Trend Micro revealed that the Android app of SHAREit, a popular file transfer service, features several critical security vulnerabilities that exposed hundreds of millions of SHAREit’s daily active users to various cybersecurity threats for several months. Despite three months having passed since the discovery, SHAREit is yet to apply security patches to its Android mobile app. Unpatched security vulnerabilities in popular file transfer and content sharing app SHAREit can lead to data theft, arbitrary code execution, and installation of malware, researchers at Trend Micro have discovered.
