Samsung devices vulnerable to dangerous Android exploit
A newly written exploit could be incoporated into an application that would have root-level permissions on a device
IDG News Service - A suspected fault in how Samsung Electronics has implemented the Android's kernel in several of its devices could allow a malicious application to gain total control over the device.
The vulnerability was described on Saturday by the user "alephzain" on XDA Developers, a forum for mobile developers. It affects devices using the Exynos processor models 4210 and 4412. Alephzain wrote that the issue was a "huge mistake."
"You should be very afraid of this exploit," Chainfire wrote. "Any app can use it to gain root without asking and without any permissions on a vulnerable device."
Affected devices include versions of Samsung's S2 and S3 mobile phones, the Galaxy Note and Note II, Galaxy Note Plus and Galaxy Note 10.1, according to the post by Chainfire.
Hackers have increasingly targeted the Android operating system, building applications that appear benign but can contain code that can steal data from a device or perform other malicious actions. Google has responded to the rise of malicious Android applications by implementing an automated scanner in its Play marketplace to detect malicious ones.
But unvetted Android applications abound around the internet, posing a risk to users. Security vendors have found malicious applications that send SMS messages to premium rate numbers and ones that intercept one-time passcodes for banking applications.
Samsung officials did not have an immediate comment.
Send news tips and comments to firstname.lastname@example.org. Follow me on Twitter: @jeremy_kirk
- Turning Insight Into Action: Social Media Intelligence The amount of data produced on social media is staggering - and so is the potential business value for enterprises that know what...
- 5 Step Guide to Social Media Security As businesses embrace social media, related security breaches are on the rise. Corporate Twitter hackings. Rogue employees on the company Facebook account. Executives...
- Social Media in Technology: A Unified Strategy for Success Find out how social media is sparking a new era of customer and industry-understanding in technology enterprises and how industry leaders are overcoming...
- CIOs strive to harness Big Data while keeping an eye on the bottom line Read this whitepaper to learn how Red Hat Storage Server allows CIOs to confidently support business growth, manage cost and risk, capitalize on...
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed in recent years, and it continues to escalate. All Malware and Vulnerabilities White Papers | Webcasts
Computerworld has launched its annual search for outstanding IT leaders who align technology with business goals. Nominate a top IT executive for the 2015 Premier 100 IT Leaders awards now through July 18.