Vulnerability is a weakness in the source code which allows cybercriminals to impair the correct operation of a system.

Security Auditor detects the following vulnerabilities in the device system: BlueBorne, EvilParcel, Extra Field, Fake ID, Janus, ObjectInputStream Serialization, OpenSSLX509Certificate, PendingIntent, SIM Toolkit, Stagefright, and Stagefright 2.0.

The vulnerabilities allow adding malicious code to some applications, that may result in performing of dangerous functions by these applications and damage the device.

If one or more of these vulnerabilities are detected on your device, check for operation system updates on the official website of your device manufacturer. Recent versions may have these vulnerabilities fixed. If there are no available updates, you are recommended to install applications only from trusted sources.

Root access

The device may become vulnerable to different types of threats if it is rooted, i.e. the procedure of rooting has been performed to attain control (known as root access) over the device system. It results in ability to modify and delete system files, that may potentially damage the device. If you have rooted your device yourself, rollback the changes for security reasons. If root access is the integral feature of your device or you need it for your everyday tasks, be extremely cautious when installing applications from the unknown sources.