November 25, 2024 05:20 (IST)
Follow us:
facebook-white sharing button
twitter-white sharing button
instagram-white sharing button
youtube-white sharing button
Mahayuti routs MVA in Maharashtra, INDIA retains Jharkhand; Priyanka's triumphant poll debut | How can Mahayuti win over 200 seats? Sanjay Raut cries foul over Maharashtra mandate | 'Third World War has begun:' Ex-Ukraine military commander-in-chief Valery Zaluzhny | UK-India Free Trade Agreement negotiations to resume in early 2024 | UK can arrest Benjamin Netanyahu if he visits country based on ICC warrant | Centre to send over 10,000 additional soldiers to violence-hit Manipur amid fresh violence | Chhattisgarh: 10 Maoists killed during encounter with security forces in Sukma | Baba Siddique murder case: Arrested Akashdeep Gill used a labourer's hotspot to evade tracking, say police | Donald Trump picks 'smart and tough' Pam Bondi as new US Attorney General after Matt Gaetz withdraws | Canadian government denies media report that claims PM Modi knew of Khalistani leader Nijjar's killing
Photo courtesy: samsung.com

Centre warns Samsung phone users of major security threats

| @indiablooms | Sep 08, 2024, at 11:44 pm

New Delhi: The Centre has issued a high-security alert for Samsung Galaxy phone users.

The Indian Computer Emergency Response Team (CERT-In) released a security advisory on Wednesday highlighting multiple vulnerabilities impacting various models of Samsung Galaxy phones.

These vulnerabilities have been categorized as high-risk, emphasizing the critical importance for Samsung users to promptly update their phone operating systems.

According to the report, Samsung Mobile Android versions 11, 12, 13, and 14 are susceptible to potential security threats.

The attackers can bypass implemented security restrictions, access sensitive information and execute arbitrary code on the targeted system in the Samsung mobiles of the specified versions.

“These vulnerabilities exist due to improper access control flaw in KnoxCustomManagerService and SmartManagerCN component, integer overflow vulnerability in facepreprocessing library; improper authorization verification vulnerability in AR Emoji, improper exception management vulnerability in Knox Guard, various out of bounds write vulnerabilities in bootloader, HDCP in HAL, libIfaaCa and libsavsac.so components, improper size check vulnerability in softsimd, improper input validation vulnerability in Smart Clip and implicit intent hijacking vulnerability in contacts,” the agency said.

Attackers can take advantage of these vulnerabilities and harm the users by causing a heap overflow or a stack-based buffer overflow.

This might let them get into the device's SIM PIN, send broadcasts with more power, read the sandbox data of AR Emoji, get around the Knox Guard lock by changing the system time, access any files they want, find sensitive information, run any code they want, and take control of the targeted system.

Support Our Journalism

We cannot do without you.. your contribution supports unbiased journalism

IBNS is not driven by any ism- not wokeism, not racism, not skewed secularism, not hyper right-wing or left liberal ideals, nor by any hardline religious beliefs or hyper nationalism. We want to serve you good old objective news, as they are. We do not judge or preach. We let people decide for themselves. We only try to present factual and well-sourced news.

Support objective journalism for a small contribution.