City
Epaper

Surveillance vendor targeted Samsung smartphones with zero-day bugs: Google

By IANS | Updated: November 11, 2022 10:15 IST

New Delhi, Nov 11 Google has warned that a commercial surveillance vendor was exploiting three zero-day security vulnerabilities ...

Open in App

New Delhi, Nov 11 Google has warned that a commercial surveillance vendor was exploiting three zero-day security vulnerabilities in new Samsung smartphones that could have been exploited to steal users' data.

All three vulnerabilities were in the manufacturer's custom components rather than in the Android Open Source Project (AOSP) platform or the Linux kernel.

"It's also interesting to note that 2 out of the 3 vulnerabilities were logic and design vulnerabilities rather than memory safety," said Maddie Stone, Project Zero.

"While we understand that Samsung has yet to annotate any vulnerabilities as in-the-wild, going forward, Samsung has committed to publicly sharing when vulnerabilities may be under limited, targeted exploitation, as part of their release notes," Stone added in a blog post.

"We hope that, like Samsung, others will join their industry peers in disclosing when there is evidence to suggest that a vulnerability is being exploited in-the-wild in one of their products".

The Google Threat Analysis Group (TAG) obtained a partial exploit chain for Samsung devices that it believes belonged to a commercial surveillance vendor.

"All 3 vulnerabilities are within Samsung custom components, including a vulnerability in a Java component," said the team.

The exploit sample targeted Samsung phones running kernel 4.14.113 with the Exynos SOC.

"Samsung phones run one of two types of SOCs depending on where they're sold. For example the Samsung phones sold in the United States, China, and a few other countries use a Qualcomm SOC and phones sold in most other places (example Europe and Africa) run an Exynos SOC," said the Google team.

Examples of Samsung phones that were running kernel 4.14.113 in late 2020 (when this sample was found) include the S10, A50, and A51 smartphones, the team added.

"The analysis of this exploit chain has provided us with new and important insights into how attackers are targeting Android devices. It highlights a need for more research into manufacturer specific components," said Google.

Disclaimer: This post has been auto-published from an agency feed without any modifications to the text and has not been reviewed by an editor

Tags: Sweet Maddie StonegooglesamsungNew DelhiUnited StatesThe statesEuaWord on macThe new delhi municipal councilWho dgDelhi south-west
Open in App

Related Stories

InternationalUS Visa Waiver Program: Can Indian Passport Holders Enter the US Without Visa? Citizens of 41 Countries Get Free Entry

TechnologyGoogle Layoffs: Indian Employees in Hyderabad and Bengaluru Likely to Be Affected

OpinionsWill the Trump Card work Against China?

Business38% Fall In Gold Prices Over The Next 5 Years: Market Experts Predict Steep Decline Ahead?

OpinionsWhat do America’s Actions Mean?

Technology Realted Stories

TechnologyNortheastern states should effectively utilise hydro-power potential: Manohar Lal

TechnologyAlleged employee claims ‘deep crisis’ at Zomato; CEO says ‘utter nonsense’

TechnologySleep well, avoid junk food to keep your liver healthy

TechnologyApple to shift all US iPhone assembly to India by 2026

TechnologySarvam AI selected to build India’s 1st artificial intelligence foundational model