Over a third of Android vulnerability reports were for issues with the Android Mediaserver component

Jun 16, 2016 22:45 GMT  ·  By

On the one-year anniversary of the Android Security Rewards Program, Google has announced it will increase cash rewards after nobody was able to crack Android's TrustZone or Verified Boot with a remote exploit.

Google says that it received and approved over 250 valid vulnerability rewards in the past year, but unfortunately, over a quarter of these were in the code of third-party OEMs, such as kernel and device drivers bugs.

The company claims that it paid over $550,000 to 82 security researchers, which means the average bug payout was $2,200 per bug or $6,700 per researcher.

One security researcher made over $75,000 just from Android bugs

Some researchers were busier than others, and Google announces that its most prolific bug hunter was @heisecode, who received $75,750 from 26 different vulnerability reports.

Google hasn't revealed who received the biggest bug bounty, but it has stated that 15 researchers earned more than $10,000 from multiple reports.

Because nobody was able to find a remote code execution in the Android kernel that resulted in a TrustZone or Verified Boot compromise, the operating system's most important and well-protected zone, Google has decided to entice researchers to have another go at this problem.

Google antes up bug payouts for high-quality vulnerability reports

The company says it would pay $50,000 for a remote exploit chain or exploits leading to TrustZone or Verified Boot compromise. Previously, Google was willing to pay $30,000.

Additionally, the company is raising the reward for a remote or proximal kernel exploit from $20,000 to $30,000.

The reward for an exploit or chain of exploits leading to a TrustZone or Verified Boot compromise via an installed app or with physical access to the device has remained $30,000.

On top of these, Google has made it clear that quality vulnerability reports are welcome by also increasing all rewards by 33 percent if they include a proof of concept. Researchers will also benefit from a 50 percent increase in rewards if, besides the proof of concept, their reports also contain a compatibility test suite for older Android versions.

Back in March, Google also increased the maximum payout for a persistent compromise of a Chromebook device operating in guest mode, stating that researchers who achieve such a feat would receive a reward of $100,000.