Good news for OnePlus 6 users! The company has already confirmed the OnePlus 6 bootloader vulnerability on its devices and promised to bring out a software update soon. Keep reading for more info!
OnePlus 6 bootloader vulnerability
The OnePlus 6 officially launched in the middle of last month and it has only recently started to make the way into the hands of consumers. The OnePlus 6 isn’t just receiving attention from users’ interest in its personal use or projects. However, as security researchers are starting to take a closer look at the device to see what they can find. One such researcher, Jason Donenfeld, has discovered a bootloader vulnerability on the phone that allows him to boot any arbitrary modified image, that bypasses bootloader protection measures.
If the OnePlus 6 bootloader image adjusts to insecure ADB and ADB as root by default, then an attacker with physical access will have total control over the device. That means that an attacker only needs to get their hands on the device to gain full access to it if they exploit this vulnerability on the OnePlus 6. After the OnePlus 6 bootloader bug was reported to multiple engineers of OnePlus, a member of the company’s security team has acknowledged the problem through a statement on the matter: “We take security seriously at OnePlus. We are in contact with the security researcher, and a software update will be rolling out shortly.”
On a side note, let’s take a look at the OnePlus 6 specs. First, it sports a 6.28-inch Optic AMOLED touchscreen with the resolution of 1080 x 2280 pixels. Besides, the phone is going to run on Android 8.1 out-of-the-box. Under the hood, OnePlus 6 takes power from the Qualcomm SDM845 Snapdragon 845 chipset. The smartphone goes with at least 6GB of RAM for the standard version. Moreover, the company equips 8GB for the upgraded variant with 64GB/256GB ROM and no card slot for expanding. You can check out the rest HERE.
OnePlus 6 vulnerability fix
We will continue following this topic and will update you once a software update is available. So stay tuned with us for more follow-ups!