Samsung smartphone flaw allows root access

Share this article:

A researcher has unearthed a vulnerability affecting several Samsung smartphone models which could allow attackers to gain administrative access to the devices through any application.

On Saturday, someone named “Alephzain," posting on the XDA Developers forum, published details about the flaw. According to the user, the security hole lies within a Samsung headset kernel and affects all devices that run using the Exynos 4210 and 4412 processor.  

All physical memory on the device can be accessed and, in the worst-case scenario, stolen or erased by an attacker who uses an app to exploit the flaw, Alephzain said. Affected devices include the Samsung Galaxy Note 2, Galaxy S3, Galaxy S2, Meizu MX – and potentially other Samsung products.  

“The good news is we can easily obtain root [access] on these devices, and the bad is there is no control over it,” wrote Alephzain. So far, the flaw doesn't appear to have been publicly exploited. On Monday, Joseph Hindy, another member of the developer forum, published additional details about the vulnerability.

A spokesman for Samsung told SCMagazine.com in an email that the company was “currently in the process of conducting an internal review” on the issue.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

ShellShock vulnerability exploited in SMTP servers

Researchers at Trend Micro found that attackers were targeting Simple Mail Transfer Protocol (SMTP) servers to execute malicious code and an IRC bot.

Hackers grab email addresses of CurrentC pilot participants

Hackers grab email addresses of CurrentC pilot participants

Although the hack didn't breach the mobile payment app itself, consumer confidence may be shaken.

Operators disable firewall features to increase network performance, survey finds

Operators disable firewall features to increase network performance, ...

McAfee found that 60 percent of 504 surveyed IT professionals prioritize security as the primary driver of network design.