Recently, exposure connects chip high at discovering last year relevant flaw, connect high express already last year the end of the year supplied safe patch to terminal manufacturer, did not discover any event that exploit this loophole happen up to now.
According to NCC Group report, after discovering this flaw last year, connect high already informed a client in October 2018, supplied safe patch to the manufacturer, bilateral according to industry usual practice, talked things over to undertook announcing to this in April this year.
It is reported, this flaw needs to get kernel attributive ability to launch attack, that is to say, the premise that this flaw can be used is terminal has been inbreaked by deepness. If the user has been in,undertook updating, criterion this software flaw already received interest repair.
With trade security research organization collaboration discovers software flaw in time and supplying safe patch is industry convention practice. To terminal user, right after operation business or terminal manufacturer supply software patch terminal undertakes in time updating, and wait for a practice from application of safe applied shop download only, all can ensure the security of terminal.
[ZOL client carries download] see information of newest science and technology, APP market is searched " ZhongGuanCun is online " , it is better that client end reads an experience.