Nytro Posted September 16, 2015 Report Posted September 16, 2015 Android 5.x Lockscreen Bypass (CVE-2015-3860)Posted on September 15, 2015 by jgor A vulnerability exists in Android 5.x <= 5.1.1 (before build LMY48M) that allows an attacker to crash the lockscreen and gain full access to a locked device, even if encryption is enabled on the device. By manipulating a sufficiently large string in the password field when the camera app is active an attacker is able to destabilize the lockscreen, causing it to crash to the home screen. At this point arbitrary applications can be run or adb developer access can be enabled to gain full access to the device and expose any data contained therein.September 2015: Elevation of Privilege Vulnerability in Lockscreen (CVE-2015-3860)The attack requires the following criteria:Attacker must have physical access to the deviceUser must have a password set (pattern / pin configurations do not appear to be exploitable)Proof-of-concept – Nexus 4 factory image 5.1.1 (build LMY48I): Sursa: Android 5.x Lockscreen Bypass (CVE-2015-3860) | UT Austin Information Security Office Quote