An application designed to exploit the recently disclosed “Certifi-gate” vulnerability affecting devices running Android has been removed from Google Play.
Earlier this month, researchers at Check Point disclosed the existence of vulnerabilities affecting the mobile Remote Support Tools (mRTS) used by Android device manufacturers and network service providers for technical support, including TeamViewer QuickSupport, RSupport, and CommuniTake RemoteCare. These tools, which are often pre-installed on devices, are signed with the manufacturer’s certificates.
The problem, according to experts, lies in the authorization methods between the RTS apps and the system-level plugins they use to read the device’s screen. The flaws, dubbed by researchers “Certifi-gate,” allow malicious applications to elevate their privileges and take control of the affected device.
Affected vendors have been notified and TeamViewer said it had released an updated version of TeamViewer QuickSupport for Android even before Check Point disclosed its findings. Check Point also developed a scanner that allows users to determine if their devices are vulnerable to potential attacks.
Data gathered by the scanner revealed that nearly 16 percent of devices had a vulnerable plugin installed, with devices made by LG being the most vulnerable. Researchers also discovered that an app uploaded to Google Play had been exploiting the Certifi-gate flaw.
The app in question, an activator for a screen video recording application called Recordable, was downloaded between 100,000 and 500,000 times from Google Play before being removed by Google.
Recordable Activator was not uploaded to Google Play by its developer, UK-based Invisibility Ltd., for malicious purposes. According to the developer, Recordable has been using the TeamViewer QuickSupport plugin to read the screen without having to activate the app over USB.
Recordable Activator achieved this by installing a vulnerable version of the TeamViewer plugin, which is trusted by Android because it’s signed by device manufacturers.
“From our research team’s perspective, the developer did a poor job of protecting the interaction with subcomponents. The communication with the Recordable Activator component can be spoofed without any authentication, thus allowing any malicious app to record the screen of the device,” Check Point explained in a blog post published on Tuesday.
In a post published on Google+ on August 18, the developers of Recordable acknowledged that the technique they used makes abuse possible.
“Both Recordable and Quicksupport inform you when they are reading the screen, but it is possible a malicious app could use the plugin to start reading the screen without telling you. So, if you have installed the plugin and are concerned about malicious apps you might want to consider uninstalling the plugin when you’re not using it,” the developers said.
According to Check Point, three devices that had the company’s Certifi-gate scanner installed were actively being exploited.
Check Point says the best way to address the vulnerability is for mobile carriers and manufacturers to release an update that revokes the certificate used to sign the vulnerable versions of the RTS plugins. However, the security firm noted that none of the affected vendors have delivered such patches.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Zyxel Firewalls Hacked by Mirai Botnet
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
- Drop in Insider Breaches Drives Decline in Intrusions at OT Organizations
- Zero-Day Vulnerability Exploited to Hack Barracuda Email Security Gateway Appliances
- OAuth Vulnerabilities in Widely Used Expo Framework Allowed Account Takeovers
- New Honeywell OT Cybersecurity Solution Helps Identify Vulnerabilities, Threats
- Rheinmetall Says Military Business Not Impacted by Ransomware Attack
Latest News
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation
- Google Cloud Users Can Now Automate TLS Certificate Lifecycle
- Zyxel Firewalls Hacked by Mirai Botnet
- Watch Now: Threat Detection and Incident Response Virtual Summit
- NCC Group Releases Open Source Tools for Developers, Pentesters
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
