Microsoft has issued a warning regarding a vulnerability pattern found in several popular Android applications with over 4 billion installations. The ‘Dirty Stream’ vulnerability allows cybercriminals to execute malicious code and steal login tokens, taking full control of an application and gaining access to user accounts and sensitive data.
Researchers at Microsoft’s Threat Intelligence team uncovered this vulnerability, which is found in the data and file exchange system on Android devices. The content provider system is used to exchange data between applications, but an incorrect implementation can introduce vulnerabilities. This can allow malicious actors to bypass security measures and gain control over the application.
Microsoft is collaborating with Google to provide guidance for Android developers to recognize and avoid this vulnerability pattern. They recommend using the Android app security guide and the Android Lint tool to identify vulnerabilities. Users are advised to keep their applications and devices updated to protect against this vulnerability.
Examples of affected applications include Xiaomi File Manager and WPS Office, which have been successfully patched. Developers began informing users about this vulnerability in February, with updates released to address the issue. Microsoft is raising awareness about this vulnerability to help prevent developers from introducing it into their Android apps, as well as to protect users from potential harm.