This OnePlus 6 Bug Could Allow Anyone With Physical Access Full Control Of Your Phone

This OnePlus 6 Bug Could Allow Anyone With Physical Access Full Control Of Your Phone

This OnePlus 6 Bug Could Allow Anyone With Physical Access Full Control Of Your Phone


According to the latest reports, a security flaw in OnePlus 6 can cause an attacker to take complete control of the device by executing arbitrary code, however, according to the reports, the Chinese company, of course, OnePlus is already working on a solution.

This OnePlus 6 Bug Could Allow Anyone With Physical Access Full Control Of Your Phone

A security flaw in OnePlus 6 can cause an attacker to take complete control of the device by executing arbitrary code, and the Chinese company is already working on a solution.

Today, within the security of Android, it is common to find ourselves with a locked bootloader to prevent our phone from ending up executing different arbitrary code. However, the OnePlus 6 allows you to boot the device with any modified or arbitrary image, even with this mentioned bootloader.

This vulnerability in OnePlus 6 has been discovered by security researcher Jason Donenfeld and, as you can imagine, it simply allows anyone with physical access to the device and certain knowledge, to start an arbitrary image in the terminal to gain full access to it.

The problem with arbitrary images is that they can be modified to include code that gives us access to root, causing us to lose total control of our device if it is stolen. In this way, if we lose our OnePlus 6, an attacker with the necessary knowledge could get easy access to all the data even if it was blocked.

In general, a locked bootloader prevents this kind of thing from happening, but in particular, this new device has this important security flaw.

From the own OnePlus, they are aware of this failure, and they assure that they are in contact with the security researcher and soon they will launch a software update.

So, what do you think about this? Simply share all your views and thoughts in the comment section below.

COMMENTS