![]() |
samsung |
The Indian government, through CERT-In, has issued a high-risk security alert for Samsung Galaxy phone
users. This advisory focuses on multiple vulnerabilities affecting both older and newer models.Severity and Urgency
The security alert, issued on December 13, categorizes the situation as high-risk.
Urgent action is recommended for existing Samsung users to update their phone's operating system (OS) and firmware.
BJP leader Mohan Yadav is set to become the 19th Chief Minister of Madhya Pradesh
Vulnerability Overview
CERT-In's vulnerability note reveals that these vulnerabilities could allow attackers to bypass security restrictions, access sensitive information, and execute arbtrary code on targeted Samsung devices.
Susceptible software versions include Samsung Mobile Android versions 11, 12, 13, and 14.
Potential Risks
These vulnerabilities expose users to various risks:
SIM PIN Theft
Attackers could steal the phone's secret code.
Broadcast with Elevated Privilege:
Attackers could command the phone loudly.
AR Emoji Files Exposure:
Unauthorized access to private AR Emoji files.
Knox Guard Lock Manipulation:
Potential to change the clock on the castle gate (Knox Guard lock).
गूगल जेमिनी क्या है जानिए हिंदी में
Access Arbitrary Files:
Snooping around the phone's files.
Sensitive Information Theft:
Stealing important and sensitive information.
Arbitrary Code Execution:
Attackers could control the phone like a puppet and compromise the targeted system.
Instructions for Users
Users are strongly advised to promptly update their Samsung Galaxy phone's operating system (OS) and firmware.
Neglecting updates may render devices vulnerable to potential threats from hackers.
Samsung has released fixes for these vulnerabilities, and users are urged to install updates immediately.
Regular software updates are crucial to prevent security breaches and unauthorized access to sensitive data.
Taking immediate action by following these steps is vital to ensure the security of Samsung Galaxy phone users against potential threats arising from these identified vulnerabilities.