Samsung Galaxy Mobile Phone Users At MAJOR Security Risk, Warns Indian Government –Check Details

New Delhi: The Indian Computer Emergency Response Team (CERT-In) beneath the Ministry of Electronics and Information Technology on Thursday issued high-risk warning for Samsung Galaxy Mobile cellphone customers.

The CERT-In Vulnerability Note CIVN-2023-0360 has flagged Multiple Vulnerabilities in Samsung Products.

“Multiple vulnerabilities have been reported in Samsung products which could allow a restrictions, access sensitive information and execute arbitrary code on the targeted,” stated the Indian Computer Emergency Response Team 

CERT-In stated that the software program affected Samsung Mobile Android variations 11, 12, 13, 14.

Why Are Samsung Galaxy Mobile Phone Users At MAJOR Security Risk?

CERT-In stated that these vulnerabilities exist attributable to improper entry management flaw in KnoxCustomManagerService and SmartManagerCN integer overflow in facepreprocessing library; improper authorization verification vulnerability in AR Emoji, improper exception administration vulnerability in Knox Guard, numerous out of bounds write vulnerabilities in bootloader, HDCP in HAL libIfaaCa and libsavsac.so elements, improper dimension verify vulnerability in softsmind, improper enter validation vulnerability in Smart Clip and implicit intent hijacking vulnerability in contacts.

Successful exploitation of those vulnerabilities might enable an attacker to set off heap overflow and stack-based buffer overflow entry machine SIM PIN, ship broadcast with elevated privilege, learn sandbox information of AR Emoj, bypass Knox Guard lock through altering system time, entry arbitrary recordsdata, acquire entry to delicate data, execute arbitrary code and compromise the focused system.

CERT-In has suggested that customers can apply apropriate safety updates as talked about by vendor in safety advisory: https://security.samsungmobile.com/securityUpdate.smsb

 

Source web site: zeenews.india.com

Rating
( No ratings yet )
Loading...