Let’s first be perfectly clear: We are fully CertifiGate protected. Now we can further elaborate on our Remote Care security.


The background: recently, two vulnerabilities within the Android platform were identified:

1. Malicious threat actors could abuse the authorization processes between privileged mobile remote control apps and on-device, system-level plugins to gain unauthorized and stealth access to mobile devices. This vulnerability was tracked in foremost remote support tools providers.

2.  Malicious threat actors could manipulate the main remote control application logic, in order to take control of the OEM signed plugin.


The CommuniTake reality: CommuniTake Remote Care fulfills secure communication processes between its internal app components. There never was an applicable ability to abuse the privileged permission-based authorization processes and assume unauthorized control over the device in the CommuniTake system.  A reported problem on the sanitization of our application’s subdomain was alerted by the Check Point security experts and was quickly resolved a few months ago. Enhanced applications were updated in real-time. We wish to thank Check Point for pointing it out.


CommuniTake is committed to the highest security standards and constantly ratifies its solutions with elite security authorities. Any alleged vulnerability is being instantly resolved and published to eliminate any possible fault. This common practice persists in the foundation of our development craftsmanship.

By Noam Potter