“Android implements several locks, like pin, password, gesture and even face recognition to lock and unlock a device. Before a user can change these settings, the device asks the user for confirmation of the previous lock,” they explained in a blog post.
“The bug exists on the ‘com.android.settings.ChooseLockGeneric class’. This class is used to allow the user to modify the type of lock mechanism the device should have.”
They claim - and have ultimately proven by releasing two proof-of-concept apps - that a rogue app can very easily perform the code change necessary to remove device locks without needing to get any permission from the user.
The flaw is present in Android OS 4.3 (Jelly Bean), and the researchers say that they have shared their findings with Google on October 11. The company apparently acknowledged having received the email, but didn’t comment on the matter, so the researchers decided to go public with it last week.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.