Samsung smartphone flaw allows root access

Share this article:

A researcher has unearthed a vulnerability affecting several Samsung smartphone models which could allow attackers to gain administrative access to the devices through any application.

On Saturday, someone named “Alephzain," posting on the XDA Developers forum, published details about the flaw. According to the user, the security hole lies within a Samsung headset kernel and affects all devices that run using the Exynos 4210 and 4412 processor.  

All physical memory on the device can be accessed and, in the worst-case scenario, stolen or erased by an attacker who uses an app to exploit the flaw, Alephzain said. Affected devices include the Samsung Galaxy Note 2, Galaxy S3, Galaxy S2, Meizu MX – and potentially other Samsung products.  

“The good news is we can easily obtain root [access] on these devices, and the bad is there is no control over it,” wrote Alephzain. So far, the flaw doesn't appear to have been publicly exploited. On Monday, Joseph Hindy, another member of the developer forum, published additional details about the vulnerability.

A spokesman for Samsung told SCMagazine.com in an email that the company was “currently in the process of conducting an internal review” on the issue.

Share this article:

Sign up to our newsletters

More in News

EFF intros wireless router software to boost industry standard

EFF intros wireless router software to boost industry ...

This weekend, the digital rights group released a "hacker alpha" version of its Open Wireless Router software.

Breaches driving organizational security strategy, survey indicates

Breaches driving organizational security strategy, survey indicates

CyberArk interviewed 373 IT security executives and other senior management in North America, Europe and the Asia-Pacific as part of its eighth annual Global Advanced Threat Landscape survey.

Siemens industrial products impacted by four OpenSSL vulnerabilities

The vulnerabilities can be exploited remotely, and fairly easily, by an attacker to hijack sessions and crash the web server of the product.