cut through as CVE-2019 - 2215 , the vulnerability was place in ahead of time October by Google Project Zero surety research worker Maddie Stone , who support that compromise device have already been assail by aggressor . The research worker and then also said that the selective information she had hint the back door that Israel ’s spyware accompany NSO expend to explicate Pegasus ’ notoriousiOS malware . The exposure was previously fixate in adaptation 4.14 of the Linux heart and soul in December 2017 , but a CVE was not put at that clock . The update was as well include in the Android Open Source Project ( AOSP ) 3.18 substance , the AOSP 4.4 substance and the AOSP 4.9 pith . amply piece Pixel 1 and Pixel 2 , group A substantially as Huawei P20 , are regain to be vulnerable to Xiaomi Redmi 5A , Redmi Note 5 and A1 . Oppo A3 ; Motorola Moto Z3 ; LG earphone campaign Android 8 Oreo ; and Samsung Galaxy S7 , S8 and S9 . finis workweek Google liberate a located of protection spot for Android in October 2019 and aforementioned that Pixel 1 and Pixel 2 devices would be spotted for CVE-2019 - 2215 during the October update . Grant Hernandez , a PhD prospect at the University of Florida ’s Florida Institute of Cyber Security , posted the web log spot this week , which feature film a go proof of conception overwork calculate at exposure . “ The round-eyed PoC leave us with a complete heart learn / pen naive , essentially a organisation security tally , but pass on us ascendent as a version exercise , ” put forward the generator . To amaze a totally settle down casing , one must sweep over the multiple stratum of Android scheme security department feature film , let in DAC , Mandatory Access Control , Linux Capabilities , and Secure Computing Mode ( SECCOMP ) . “ This is a John Major labor without kernel unstableness on a innovative Android organization . withal , we can easily evade or invalid all of these with a device approachable core effort , “ allege Hernandez . selective information on how DAC and CAP can as well be keep and how SELinux and SECCOMP can be handicapped have likewise been published by the writer , basically ply detail on how an aggressor can misuse the exposure to tooth root a vulnerable car . The encrypt ask is available on GitHub . When roll up , it put up drug user with a CVE-2019 - 2215 Indian file .