14 Aug 2025

Zimperium, the world pioneer in mobile security, is warning organizations about the growing risks posed by rooting and jailbreaking tools, which continue to expose mobile devices to severe security vulnerabilities.

These tools, often developed by independent developers without proper security oversight, enable unauthorized access to mobile systems and can be exploited by cybercriminals.

Zimperium’s research

Zimperium’s research has highlighted how modern rooting frameworks, such as KernelSU

Zimperium’s research has highlighted how modern rooting frameworks, such as KernelSU, APatch, and SKRoot, bypass traditional security measures, giving attackers deep access to compromised devices.

These tools typically rely on weak or improperly implemented authentication mechanisms, allowing malicious applications to gain full control over a device.

KernelSU rooting framework

One such vulnerability in the KernelSU rooting framework allows attackers to bypass authentication and gain root access.

The flaw exploits weaknesses in how the kernel verifies legitimate applications, enabling attackers to impersonate trusted apps and escalate their privileges. 

Risk to mobile device security

Despite the passage of time, this vulnerability remains a critical risk to mobile device security

Despite the passage of time, this vulnerability remains a critical risk to mobile device security, with cybercriminals increasingly targeting these weak points.

These vulnerabilities put millions of users at risk, as attackers can exploit them to steal sensitive data or take full control of compromised devices,” said Nico Chiaraviglio, Chief Scientist at Zimperium. “Rooting tools are often updated without thorough security reviews, making them a persistent threat to enterprise mobile security.”

Importance of vigilance in mobile security

Zimperium’s ongoing research into rooting frameworks emphasizes the importance of vigilance in mobile security.

The findings underscore the critical need for enterprises to be aware of the security risks associated with rooting tools and the growing sophistication of mobile cyberattacks.