At the beginning of October 2019, experts at the Google Project Zero team reported an unpleasant bug in the Android kernel, due to which attackers could gain root access to the target device. The zero-day vulnerability received the identifier CVE-2019-2215 and poses a threat to the following smartphones running Android 8.x and newer:
- Pixel 2 running Android 9 and Android 10 preview;
- Huawei P20;
- Xiaomi Redmi 5A;
- Xiaomi Redmi Note 5;
- Xiaomi A1;
- Oppo A3;
- Moto Z3;
- Oreo LG smartphones
- Samsung S7, S8, S9.
After disclosing information about the problem, Google specialist Maddy Stone published in the public domain PoC exploit, but its code was to a certain extent harmless, since it did not use the full potential of the vulnerability.
Now the idea is further developed by Grant Hernandez, Ph.D. from the Florida Institute of Cybersecurity at the University of Florida. He introduced his own PoC exploit called Qu1ckR00t, which bypasses security mechanisms such as DAC (Discretionary Access Control) and Linux Capabilities (CAP), can disable SELinux (Security-Enhanced Linux), SECCOMP (Secure Computing Mode) and MAC (Mandatory Access Control). As a result, the tool can be used to gain quick root access to the device, giving the attacker full control.
Source code Qu1ckR00t has been published for Github, but not as a finished and packaged APK file. That is, the user will have to compile it himself, but after that he will get access to the application, which can provide root access with just one click.
Hernandez warns that he tested Qu1ckR00t only on Pixel 2, and inexperienced users are better off not experimenting with this tool, as they risk disrupting the OS and losing all the data.