Contents:
Several critical security flaws have been disclosed in Samsung’s pre-installed Android apps, which, if successfully exploited, could allow threat actors to take control of the devices and access users’ personal data without their consent.
The vulnerabilities were discovered and reported by Oversecured founder Sergey Toshin in February 2021. In an analysis published on Thursday, Toshin stated that
The impact of these bugs could have allowed an attacker to access and edit the victim’s contacts, calls, SMS/MMS, install arbitrary apps with device administrator rights, or read and write arbitrary files on behalf of a system user which could change the device’s settings.
These vulnerabilities could have led to a GDPR violation, and we are delighted that we could help Samsung identify and fix these vulnerabilities in a timely manner.
Following the reveal, Samsung issued security patches as part of its April and May security updates. Below you can see a list of the seven vulnerabilities:
- CVE-2021-25356 – Third-party authentication bypass in Managed Provisioning;
- CVE-2021-25388 – Arbitrary app installation vulnerability in Knox Core;
- CVE-2021-25390 – Intent redirection in PhotoTable;
- CVE-2021-25391 – Intent redirection in Secure Folder;
- CVE-2021-25392 – Possible to access notification policy file of DeX;
- CVE-2021-25393 – Possible to read/write access to arbitrary files as a system user (affects the Settings app);
- CVE-2021-25397 – Arbitrary file write in TelephonyUI.
0day on all Samsung devices: installing third-party apps and providing them Device Admin rights (no permissions required). However, it also leads that all other apps are being deleted? pic.twitter.com/yjy2AsoWTU
— Sergey Toshin (@_bagipro) February 14, 2021
According to Toshin, the impact of these flaws means that threat actors could exploit them to install arbitrary third-party apps, grant the device admin privileges to delete other installed applications or steal sensitive files, read or write arbitrary files as a system user, and even execute privileged actions.
Toshin received $5,460 for letting Samsung know about CVE-2021-25393, a vulnerability impacting their Settings app. The flaw gave hackers access to arbitrary files as an actual system user.
He got another $4,850 from February’s batch of bugs that allowed creating arbitrary files disguised as a Telephony user who can access SMS and call details.
In total, he received almost $30,000 since the beginning of 2021 for disclosing 14 issues within the South Korean tech giant devices’ systems.
Samsung recommends device owners apply the company’s latest firmware updates to avoid any potential security risks.