
- #ANDROID SHAREIT PLAY STORECIMPANUZDNET APK#
- #ANDROID SHAREIT PLAY STORECIMPANUZDNET ANDROID#
- #ANDROID SHAREIT PLAY STORECIMPANUZDNET CODE#
“In the past, vulnerabilities that can be used to download and steal files from users’ devices have also been associated with the app.
#ANDROID SHAREIT PLAY STORECIMPANUZDNET CODE#
They can also potentially lead to Remote Code Execution (RCE),” the researchers said. “The vulnerabilities can be abused to leak a user’s sensitive data and execute arbitrary code with SHAREit permissions by using a malicious code or app.
#ANDROID SHAREIT PLAY STORECIMPANUZDNET APK#
The vulnerabilities also allow an attacker to carry out man-in-the-middle attack by downloading and installing malicious APK files from an arbitrary URL, invoking RCE of arbitrary code etc. What’s more is that the external app data and the download directory are unencrypted and can be easily modified by hackers when conducting man-in-the-disk attacks.
#ANDROID SHAREIT PLAY STORECIMPANUZDNET ANDROID#
SHAREit’s Android app, in which the flaws were discovered, requests a number of privacy-invasive permissions from mobile users such as location, camera, storage, Wi-Fi connection information, contacts, microphone, photos/media/files, device & app history, device ID & call information, phone, and other mobile device permissions.Īccording to Trend Micro, vulnerabilities in SHAREit exist due to improperly set up app code access protocols that expose its internal (non-public) as well as external app activities, download directory, and gives a third-party entity with temporary read/write access to the all device data within the /data/data/ folder. See Also: Popular WhatsApp Alternatives Found Harboring Serious Privacy Flaws The app has been downloaded more than a billion times from the Android Play Store, and boasts at least 500 million daily active users across platforms. Ltd., SHAREit enables users to transfer various kinds of files including Android application packages (apk).

Owned by Singapore-based tech giant Smart Media4U Technology Pte. Besides the inherent risk of remote code execution (RCE), vulnerabilities in SHAREit can also lead to man-in-the-middle, and man-in-the-disk attacks.

“We reported these vulnerabilities to the vendor, who has not responded yet,” wrote senior engineers Echo Duan and Jesse Chang at Trend Micro, detailing how the exploitation of these security flaws could allow the execution of malicious code where the app is located on the device. In a blog post published this week, Trend Micro revealed that the Android app of SHAREit, a popular file transfer service, features several critical security vulnerabilities that exposed hundreds of millions of SHAREit’s daily active users to various cybersecurity threats for several months. Despite three months having passed since the discovery, SHAREit is yet to apply security patches to its Android mobile app. Unpatched security vulnerabilities in popular file transfer and content sharing app SHAREit can lead to data theft, arbitrary code execution, and installation of malware, researchers at Trend Micro have discovered.
