Member-only story

How Android POS Exploits Uncover Security Risks for Vehicles & Beyond

Vijay Kumar Gupta
7 min readNov 13, 2024

In recent years, as Android OS has grown from mobile devices to various specialized hardware, it’s becoming clear that vulnerabilities in this open-source operating system carry significant security risks, especially in high-stakes environments like Point-of-Sale (POS) terminals and in-vehicle infotainment (IVI) systems. A recent study by security researcher Jacopo Jannone titled “Exploring and Exploiting an Android ‘Smart POS’ Payment Terminal” sheds light on just how susceptible Android-based devices can be to exploitation and the profound implications this holds for systems beyond POS, such as automotive security.

This blog dives deep into the techniques Jannone used to gain access to an Android-based POS device, the security implications of his findings, and how these insights can be applied to securing other Android-based systems, especially those in vehicles. Let’s look into the methods used, the risks exposed, and what this means for security teams across industries.

The Journey: Rooting an Android POS “Smart Terminal”

1. Initial Access and Device Connection

To exploit the Android POS device, Jannone first had to establish a connection to the terminal. This connection is critical for…

--

--

Vijay Kumar Gupta
Vijay Kumar Gupta

Written by Vijay Kumar Gupta

Vijay Gupta is an inspiring public speaker and social entrepreneur who has dedicated his life to bringing about positive change and empowering communities.

No responses yet