Samsung devices vulnerable to dangerous Android exploit
A newly written exploit could be incoporated into an application that would have root-level permissions on a device
IDG News Service - A suspected fault in how Samsung Electronics has implemented the Android's kernel in several of its devices could allow a malicious application to gain total control over the device.
The vulnerability was described on Saturday by the user "alephzain" on XDA Developers, a forum for mobile developers. It affects devices using the Exynos processor models 4210 and 4412. Alephzain wrote that the issue was a "huge mistake."
"You should be very afraid of this exploit," Chainfire wrote. "Any app can use it to gain root without asking and without any permissions on a vulnerable device."
Affected devices include versions of Samsung's S2 and S3 mobile phones, the Galaxy Note and Note II, Galaxy Note Plus and Galaxy Note 10.1, according to the post by Chainfire.
Hackers have increasingly targeted the Android operating system, building applications that appear benign but can contain code that can steal data from a device or perform other malicious actions. Google has responded to the rise of malicious Android applications by implementing an automated scanner in its Play marketplace to detect malicious ones.
But unvetted Android applications abound around the internet, posing a risk to users. Security vendors have found malicious applications that send SMS messages to premium rate numbers and ones that intercept one-time passcodes for banking applications.
Samsung officials did not have an immediate comment.
Send news tips and comments to firstname.lastname@example.org. Follow me on Twitter: @jeremy_kirk
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Security for Virtualization In the rush to implement virtualization, security has become second. So while the business benefits are clear, the risks are less well documented...
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Malware and Vulnerabilities White Papers | Webcasts