Experts at Zimperium Mobile Security Labs (zLabs) recently discovered a critical flaw, dubbed Stagefright affecting the Android OS.
The experts revealed that the Stagefright flaw (CVE-2015-1538) potentially affects 95% of Android devices running version 2.2 to 5.1 of the Google OS (roughly 950 million smartphones). The Zimperium firm consider the Stagefright vulnerability as the worst Android flaw in the mobile OS history, the vulnerability affects a media library app that is used for by Android to process Stagefright media files. According to the experts at Zimperium the media library is affected by several vulnerabilities.
“We are pleased to finally make this code available to the general public so that security teams, administrators, and penetration testers alike may test whether or not systems remain vulnerable. What follows is a python script that generates an MP4 exploiting the ‘stsc’ vulnerability otherwise known as CVE-2015-1538 (#1).” states Zimperium.
The experts released the Stagefright exploits to allow security experts to examine their systems against this vulnerability.
According to the US-CERT/CC advisory, the Android Stagefright contains multiple vulnerabilities including:
The experts released the slides for the Stagefright exploit presented at the last Black Hat and DEF CON conference. The full video of the presentation at the Black Hat is available on YouTube.
The experts released the Stagefright exploit (Stagefright_CVE-2015-1538-1_Exploit.py).
(Security Affairs – Stagefright exploit, Android)
Microsoft Patch Tuesday security updates for May 2025 addressed 75 security flaws across multiple products, including…
Fortinet fixed a critical remote code execution zero-day vulnerability actively exploited in attacks targeting FortiVoice…
Interlock Ransomware 's attack on a defense contractor exposed global defense supply chain details, risking…
Marks and Spencer (M&S) confirms that threat actors stole customer data in the ransomware attack…
A 45-year-old foreign man has been arrested in Moldova for allegedly participating in ransomware attacks…
A Türkiye-linked group used an Output Messenger zero-day to spy on Kurdish military targets in…
This website uses cookies.