Google Experts Find 18 Vulnerabilities in Samsung Chipsets
Google experts found 18 vulnerabilities in Samsung chipsets.
They are used in Android smartphones and cars.
Google Project Zero, a team that specializes in finding zero-day vulnerabilities, has found a whole set of problems with Samsung Exynos chipsets. There are 18 vulnerabilities in total, of which four are critical as they allow you to execute any arbitrary code remotely. And now, the best (or worst) part: All that is needed is the phone number associated with the device. That’s it. Access to the provider’s network? Not needed. User interaction? Likewise.
This highlights the importance of keeping personal information, such as phone numbers, private and secure. It also emphasizes the need for regular software updates and security patches to prevent the exploitation of vulnerabilities.
The story is more interesting in the case of cars; the scope of the problem is not fully understood, but such a vulnerability could have potentially disastrous consequences, especially in the case of modern cars, where the onboard computer can do a lot. In fact, we have a potential way to improve the effectiveness of such software.
It is crucial to address all critical vulnerabilities as soon as possible to prevent any potential harm to drivers and passengers. Additionally, car manufacturers must prioritize the security of their onboard computer systems to ensure the safety of their customers.
The S22, M33, M13, M12, A71, A53, A33, A21, A13, A12, and A04 series from Samsung; the Pixel (6 and 7); and a number of Vivo phones and cars with this chip are at risk. In fact, it will be nearly impossible to close all vulnerabilities on all devices in a timely manner. Although the patches have already been sent to the manufacturers, they will not be implemented right away, and they may not be available at all for older phone models. Only Pixel smartphones have been patched as of yet.
As a temporary workaround, Samsung suggests turning off Wi-Fi calling and VoLTE and waiting for updates.
This delay in patch implementation may leave millions of Android users vulnerable, and it highlights the need for more efficient and timely security updates for all Android devices. Additionally, users should remain vigilant and take necessary precautions, such as avoiding unsecured Wi-Fi networks and using VPNs to protect their data.
This is Android, and we’ve already stated that the ecosystem is open, making a rapid response and vulnerability closure impossible. When it comes to hardware, regardless of OS modification, all devices become vulnerable. Android is inherently more vulnerable!
Read more related articles:
In line with the Trust Project guidelines, please note that the information provided on this page is not intended to be and should not be interpreted as legal, tax, investment, financial, or any other form of advice. It is important to only invest what you can afford to lose and to seek independent financial advice if you have any doubts. For further information, we suggest referring to the terms and conditions as well as the help and support pages provided by the issuer or advertiser. MetaversePost is committed to accurate, unbiased reporting, but market conditions are subject to change without notice.