Qihoo 360 researcher Guang Gong showcased the exploit. The vulnerability resides in JavaScript v8, Google’s open source JavaScript engine. For the vulnerability to be exploited, users needs to be tricked to visit a malicious website using Chrome Web browser.
An attacker is then able to install an arbitrary application and gain the full privileges of the device. He noted that the attack was “one shot exploit,” essentially meaning that just one vulnerability was enough to perform the attack. The exploit worked on many other devices as well, said Dragos Ruiu, the organiser of PacSec.
“The impressive thing about Guang’s exploit is that it was one shot; most people these days have to exploit several vulnerabilities to get privileged access and load software without interaction,” Ruiu told Vulture South.
“As soon as the phone accessed the website the JavaScript v8 vulnerability in Chrome was used to install an arbitrary application (in this case a BMX Bike game) without any user interaction to demonstrate complete control of the phone.”