The vulnerability identified could be leveraged to modify Android apps without altering their cryptographic signatures.
Researchers said that it is different from the vulnerability found by Bluebox, but both effects are the same. That was after they have studied the technical details exposed by Bluebox.
An attacker can modify the original apk, but does not modify its original apk’s signature. Just principle with Bluebox Security vulnerabilities are not the same exposure, but the effect is the same.
Browse in the researchers blog post to see full technical details of the android vulnerability.