February 11, 2026 11:46 am (IST)
Follow us:
facebook-white sharing button
twitter-white sharing button
instagram-white sharing button
youtube-white sharing button
Bangladesh poll manifestos mirror India’s welfare schemes as BNP, Jamaat bet big on women, freebies | Drama ends: Pakistan makes U-turn on India boycott, to play T20 World Cup clash as per schedule | ‘Won’t allow any impediment in SIR’: Supreme Court pulls up Mamata govt over delay in sharing officers’ details | India-US trade deal: ‘Negotiations always two-way’, says Amul MD amid farmers’ concerns | Khamenei breaks 37-year-old ritual for first time amid escalating Iran-US tensions | India must push for energy independence amid global uncertainty: Vedanta chairman Anil Agarwal | Kanpur horror: Lamborghini driven by businessman’s son rams vehicles, injures six | ‘Namaste Trump beat Howdy Modi’: Congress slams PM Over India-US trade deal | Historic India-US trade pact: Tariffs cut, $500B market opportunity unlocked! | Big call from RBI: Repo rate stays at 5.25%, neutral stance continues
Photo courtesy: samsung.com

Centre warns Samsung phone users of major security threats

| @indiablooms | Dec 16, 2023, at 06:25 am

New Delhi: The Centre has issued a high-security alert for Samsung Galaxy phone users.

The Indian Computer Emergency Response Team (CERT-In) released a security advisory on Wednesday highlighting multiple vulnerabilities impacting various models of Samsung Galaxy phones.

These vulnerabilities have been categorized as high-risk, emphasizing the critical importance for Samsung users to promptly update their phone operating systems.

According to the report, Samsung Mobile Android versions 11, 12, 13, and 14 are susceptible to potential security threats.

The attackers can bypass implemented security restrictions, access sensitive information and execute arbitrary code on the targeted system in the Samsung mobiles of the specified versions.

“These vulnerabilities exist due to improper access control flaw in KnoxCustomManagerService and SmartManagerCN component, integer overflow vulnerability in facepreprocessing library; improper authorization verification vulnerability in AR Emoji, improper exception management vulnerability in Knox Guard, various out of bounds write vulnerabilities in bootloader, HDCP in HAL, libIfaaCa and libsavsac.so components, improper size check vulnerability in softsimd, improper input validation vulnerability in Smart Clip and implicit intent hijacking vulnerability in contacts,” the agency said.

Attackers can take advantage of these vulnerabilities and harm the users by causing a heap overflow or a stack-based buffer overflow.

This might let them get into the device's SIM PIN, send broadcasts with more power, read the sandbox data of AR Emoji, get around the Knox Guard lock by changing the system time, access any files they want, find sensitive information, run any code they want, and take control of the targeted system.

Support Our Journalism

We cannot do without you.. your contribution supports unbiased journalism

IBNS is not driven by any ism- not wokeism, not racism, not skewed secularism, not hyper right-wing or left liberal ideals, nor by any hardline religious beliefs or hyper nationalism. We want to serve you good old objective news, as they are. We do not judge or preach. We let people decide for themselves. We only try to present factual and well-sourced news.

Support objective journalism for a small contribution.