“Android implements several locks, like pin, password, gesture and even face recognition to lock and unlock a device. Before a user can change these settings, the device asks the user for confirmation of the previous lock,” they explained in a blog post.
“The bug exists on the ‘com.android.settings.ChooseLockGeneric class’. This class is used to allow the user to modify the type of lock mechanism the device should have.”
They claim - and have ultimately proven by releasing two proof-of-concept apps - that a rogue app can very easily perform the code change necessary to remove device locks without needing to get any permission from the user.
The flaw is present in Android OS 4.3 (Jelly Bean), and the researchers say that they have shared their findings with Google on October 11. The company apparently acknowledged having received the email, but didn’t comment on the matter, so the researchers decided to go public with it last week.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.