A zero-click vulnerability in Samsung mobile phones if exploited could allow a malicious actor to gain access to all the permissions and privileges associated with Samsung Messenger with no interaction by the user.
The problem only exists within Samsung phones running Android version 4.4.4 or later. This version was first offered in late 2014 but is still actively developed by the vendor with the latest version being pushed out on January 10, 2020 or just before Samsung was informed of the problem on January 28. Samsung publicly thanked Mateusz Jurczyk of Google Project Zero for finding the critical vulnerability, listed as SVE-2020-16747, a memory corruption issue in Qmage image codec built into Skia, an open-source 2D library that serves as the graphics engine across Google Chrome and OS, Android, Mozilla Firefox and Firefox OS, according to Skia.org.
Samsung issued a patch in May. If a device is not updated an attacker could possibly remotely execute arbitrary code execution, but the patch adds the proper validation to prevent memory overwrite. A successful attack would give the threat actor the same privileges as the owner and thus access to personal user information: call logs, contacts, microphone, storage and SMS.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.