May 14, 2026 10:15 am (IST)
Follow us:
facebook-white sharing button
twitter-white sharing button
instagram-white sharing button
youtube-white sharing button
Vijay-led TVK wins Tamil Nadu floor test as AIADMK split plays out | Congress veteran Sonia Gandhi admitted to Medanta Hospital in Gurugram | PM Modi halves convoy size after austerity call | Mulayam Singh's younger son Prateek Yadav dies at 38 | Protests erupt in Delhi after NEET UG 2026 cancellation over alleged paper leak | AIADMK cracks widen after Tamil Nadu defeat; faction backs Vijay-led TVK government | Himanta Biswa Sarma takes oath as Assam CM for second term after BJP’s landslide win | Bengali rights activist Garga Chatterjee arrested over alleged provocative remarks ahead of assembly polls | No return to full WFH yet: IT firms unlikely to change hybrid work model despite PM Modi’s appeal | Suvendu Adhikari Cabinet clears BSF land transfer, census rollout, Ayushman Bharat in Bengal
Photo courtesy: samsung.com

Centre warns Samsung phone users of major security threats

| @indiablooms | Dec 16, 2023, at 06:25 am

New Delhi: The Centre has issued a high-security alert for Samsung Galaxy phone users.

The Indian Computer Emergency Response Team (CERT-In) released a security advisory on Wednesday highlighting multiple vulnerabilities impacting various models of Samsung Galaxy phones.

These vulnerabilities have been categorized as high-risk, emphasizing the critical importance for Samsung users to promptly update their phone operating systems.

According to the report, Samsung Mobile Android versions 11, 12, 13, and 14 are susceptible to potential security threats.

The attackers can bypass implemented security restrictions, access sensitive information and execute arbitrary code on the targeted system in the Samsung mobiles of the specified versions.

“These vulnerabilities exist due to improper access control flaw in KnoxCustomManagerService and SmartManagerCN component, integer overflow vulnerability in facepreprocessing library; improper authorization verification vulnerability in AR Emoji, improper exception management vulnerability in Knox Guard, various out of bounds write vulnerabilities in bootloader, HDCP in HAL, libIfaaCa and libsavsac.so components, improper size check vulnerability in softsimd, improper input validation vulnerability in Smart Clip and implicit intent hijacking vulnerability in contacts,” the agency said.

Attackers can take advantage of these vulnerabilities and harm the users by causing a heap overflow or a stack-based buffer overflow.

This might let them get into the device's SIM PIN, send broadcasts with more power, read the sandbox data of AR Emoji, get around the Knox Guard lock by changing the system time, access any files they want, find sensitive information, run any code they want, and take control of the targeted system.

Support Our Journalism

We cannot do without you.. your contribution supports unbiased journalism

IBNS is not driven by any ism- not wokeism, not racism, not skewed secularism, not hyper right-wing or left liberal ideals, nor by any hardline religious beliefs or hyper nationalism. We want to serve you good old objective news, as they are. We do not judge or preach. We let people decide for themselves. We only try to present factual and well-sourced news.

Support objective journalism for a small contribution.