December 15, 2024 03:29 (IST)
Follow us:
facebook-white sharing button
twitter-white sharing button
instagram-white sharing button
youtube-white sharing button
Pushpa 2 stampede: Allu Arjun walks out of jail, actor's lawyer slams delay in release | Donald Trump intends to end 'inconvenient' and 'very costly' Daylight Saving Time | Suchir Balaji: Indian-origin former OpenAI researcher found dead at US apartment | Bengaluru techie suicide: Karnataka Police issues summons to wife Nikita, her family members | French President Macron appoints centrist leader Francois Bayrou as new Prime Minister | Congress always prioritised personal interest over Constitution: Rajnath Singh | Jaishankar calls attack on Hindus in Bangladesh 'a source of concern' | Allu Arjun arrested over woman's death in stampede during Pushpa 2 premiere show | RBI receives bomb threat in Russian language, case filed | UP teenager kills mother, lives with body for 5 days
Photo courtesy: samsung.com

Centre warns Samsung phone users of major security threats

| @indiablooms | Dec 16, 2023, at 06:25 am

New Delhi: The Centre has issued a high-security alert for Samsung Galaxy phone users.

The Indian Computer Emergency Response Team (CERT-In) released a security advisory on Wednesday highlighting multiple vulnerabilities impacting various models of Samsung Galaxy phones.

These vulnerabilities have been categorized as high-risk, emphasizing the critical importance for Samsung users to promptly update their phone operating systems.

According to the report, Samsung Mobile Android versions 11, 12, 13, and 14 are susceptible to potential security threats.

The attackers can bypass implemented security restrictions, access sensitive information and execute arbitrary code on the targeted system in the Samsung mobiles of the specified versions.

“These vulnerabilities exist due to improper access control flaw in KnoxCustomManagerService and SmartManagerCN component, integer overflow vulnerability in facepreprocessing library; improper authorization verification vulnerability in AR Emoji, improper exception management vulnerability in Knox Guard, various out of bounds write vulnerabilities in bootloader, HDCP in HAL, libIfaaCa and libsavsac.so components, improper size check vulnerability in softsimd, improper input validation vulnerability in Smart Clip and implicit intent hijacking vulnerability in contacts,” the agency said.

Attackers can take advantage of these vulnerabilities and harm the users by causing a heap overflow or a stack-based buffer overflow.

This might let them get into the device's SIM PIN, send broadcasts with more power, read the sandbox data of AR Emoji, get around the Knox Guard lock by changing the system time, access any files they want, find sensitive information, run any code they want, and take control of the targeted system.

Support Our Journalism

We cannot do without you.. your contribution supports unbiased journalism

IBNS is not driven by any ism- not wokeism, not racism, not skewed secularism, not hyper right-wing or left liberal ideals, nor by any hardline religious beliefs or hyper nationalism. We want to serve you good old objective news, as they are. We do not judge or preach. We let people decide for themselves. We only try to present factual and well-sourced news.

Support objective journalism for a small contribution.