The firm also identified the vulnerability as CVE-2016-2060 which is present in a software package managed by the chip maker, Qualcomm. If the vulnerability is exploited by hackers, it can let the hacker to access the user’s SMS database, phone history and more things. The software package is open source, it could also affect the other projects which also includes Cyanogenmod. The vulnerability which is quite stiff in Android 4.3 or lower, as it lets low privileged apps to access to sensitive details which the user generally don’t want to disclose or to be in off limits, Security firm Fireeye stated. However, the data is usable by invoking permissions which are already seeked by millions of Google Play Apps. The researchers from the company said that the vulnerability can be exploited by adversaries that acquire physical access to an unlocked device. The vulnerability is dubbed as CVE-2016-2060 as stated above, the flaw emerged when chip maker, Qualcomm published set of programming interfaces for a system service called “network_manager” and later termed as “netd” daemon. “Any application could interact with this API without triggering any alerts,” states FireEye. “Google Play will likely not flag it as malicious, and FireEye Mobile Threat Prevention (MTP) did not initially detect it. It’s hard to believe that any antivirus would flag this threat. Additionally, the permission required to perform this is requested by millions of applications, so it wouldn’t tip the user off that something is wrong.” Attacker can acquire access to the device via physical access or by installing a malicious apps on the device by phishing strategy, fake download or by other way. Surprisingly, it is also difficult for victims to spot whether their devices are infected, as the victim may not experience slower performance or crashes. “Since this is an open-source software package developed and made freely available by Qualcomm, people are using the code for a variety of projects, including Cyanogenmod (a fork of Android). The vulnerable APIs have been observed in a Git repository from 2011, indicating that someone was using this code at that time. This will make it particularly difficult to patch all affected devices, if not impossible. The OEMs will now need to provide updates for their devices; however, many devices will likely never be patched” states FireEye.