Samsung phone users under attack, Google warns

Samsung phone users under attack, Google warns

October 23, 2024 at 08:25PM

Google security researchers identified a critical vulnerability (CVE-2024-44068) in Samsung’s Exynos mobile chips, allowing attackers to escalate privileges and remotely execute code. The flaw, rated 8.1 on the CVSS scale, affects multiple processor versions. Samsung issued a patch on October 7, but in-the-wild exploits have already emerged.

### Meeting Notes Takeaways:

1. **Security Vulnerability Identified**: A serious vulnerability (CVE-2024-44068) has been discovered in Samsung’s mobile chips, specifically affecting Exynos processors (models 9820, 9825, 980, 990, 850, and W920).

2. **Vulnerability Details**:
– **Type**: Use-after-free vulnerability leading to exploitation.
– **Severity Rating**: It has an 8.1 out of 10 CVSS severity rating, categorized as high-severity by Samsung.
– **Patch Status**: Samsung issued a security patch for this vulnerability on October 7.

3. **Exploitation**:
– Researchers from Google reported that the vulnerability is being exploited in the wild as part of an exploit chain to escalate privileges and execute arbitrary code remotely.
– Attackers are using the vulnerabilities in conjunction with other unidentified CVEs to execute code on affected devices.

4. **Technical Overview**:
– The vulnerability resides in memory management related to device driver functioning.
– It allows attackers to execute arbitrary code in a privileged ‘cameraserver’ process, changing its name for anti-forensic evasion.

5. **No Official Confirmation**: Samsung has yet to provide additional information regarding the ongoing exploits and vulnerabilities.

6. **Context of Threat**: Google TAG is actively monitoring zero-day vulnerabilities, especially those used by espionage-related groups targeting mobile devices. A notable number of zero-days (61) were tracked in 2023, which could suggest potential risks of snooping malware linked to this exploit chain.

7. **Next Steps**: Await further information or confirmation from Samsung regarding the exploitation details and any additional measures in place to mitigate risks.

### Action Items:
– Stay updated on further communications from Samsung regarding this vulnerability.
– Consider monitoring affected devices for unusual activities or potential exploits.

Full Article