A vulnerability affecting the Android operating system among others deals with Wi-Fi technology that could allow an attacker to escalate privileges and cause a denial-of-service (DoS).
The flaw, discovered by Imre Rad of Hungary-based research company SEARCH-LAB, affects wpa_supplicant, the open source Wi-Fi Protected Access (WPA) supplicant.
The vulnerability can end up exploited to write arbitrary values in the wpa_supplicant configuration file, allowing an attacker to execute arbitrary code with elevated privileges or disrupt a device’s Wi-Fi functionality.
The weakness can be exploited either through a WPS attack (CVE-2016-4476) or the wpa_supplicant control interface (CVE-2016-4477).
Rad reported the vulnerability to Google on February 24 and the search giant later notified wpa_supplicant developers.
Google described the flaw as a high severity privilege escalation in the Wi-Fi component that allows a local malicious application to execute arbitrary code in the context of an elevated system application. The vulnerability, patched with this month’s Android security updates, affects versions 4.4.4, 5.0.2, 5.1.1, 6.0 and 6.0.1 of Google’s mobile operating system, which currently run on 75 percent of Android devices.
Wpa_supplicant developers patched the flaw in early May and SEARCH-LAB said fixes in development for a wide range of products.