Announcement

Collapse
No announcement yet.

Vulnerability in Samsung Exynos wireless modules exploited via the Internet.

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Vulnerability in Samsung Exynos wireless modules exploited via the Internet.

    Researchers from Google's Project Zero team reported identifying 18 vulnerabilities in Samsung Exynos 5G/LTE/GSM modems. The four most dangerous vulnerabilities (CVE-2023-24033) allow for code execution at the baseband chip level through manipulation from external internet networks. According to Google Project Zero, with a little extra research, a skilled attacker could quickly develop a working exploit that would allow remote control of a wireless module, knowing only the victim's phone number. The attack can be carried out unnoticed by the user and does not require any action on the part of the user.

    The remaining 14 vulnerabilities have a lower risk level, as the attack requires access to the mobile network operator's infrastructure or local access to the user's device. With the exception of CVE-2023-24033, a fix for which was suggested in the March firmware update for Google Pixel devices, the issues remain unresolved. The only thing known about the CVE-2023-24033 vulnerability so far is that it is caused by incorrect validation of the "accept-type" attribute format transmitted in SDP (Session Description Protocol) messages.

    Until the vulnerability is fixed, it is recommended that users disable VoLTE (Voice-over-LTE) support and Wi-Fi calling in their settings. Devices equipped with Exynos chips, such as Samsung smartphones (S22, M33, M13, M12, A71, A53, A33, A21, A13, A12 and A04), Vivo (S16, S15, S6, X70, X60 and X30), Google Pixel (6 and 7), and also Exynos W920-based wearable devices and car systems with Exynos Auto T5123 chipset.

    Due to the danger of the vulnerabilities and the realistic likelihood of an exploit appearing quickly, Google has decided to make an exception for the 4 most dangerous problems and postpone disclosure of the nature of the problems. For the remaining vulnerabilities, the disclosure schedule will be respected after 90 days of vendor notification (CVE-2023-26072, CVE-2023-26073, CVE-2023-26074, CVE-2023-26075 and CVE-2023-26076 vulnerabilities are already in the bug tracking system, while the remaining 9 have 90 days to expire). Marked vulnerabilities CVE-2023-2607* are caused by buffer overflow during decoding of certain options and lists in NrmmMsgCodec and NrSmPcoCodec.​

  • #2
    Users should be advised that until the vulnerability is resolved, they should deactivate VoLTE (Voice-over-LTE) support and Wi-Fi calling in their settings. However, many consumers, in my opinion, are unaware of the presence of this issue. To remain up to date on the newest cybersecurity risks and vulnerabilities, I recommend consulting credible sources such as Samsung security advisories and CERT.

    Comment


    • #3
      Originally posted by ZFKerr View Post
      Researchers from Google's Project Zero team reported identifying 18 vulnerabilities in Samsung Exynos 5G/LTE/GSM modems. The four most dangerous vulnerabilities (CVE-2023-24033) allow for code execution at the baseband chip level through manipulation from external internet networks. According to Google Project Zero, with a little extra research, a skilled attacker could quickly develop a working exploit that would allow remote control of a wireless module, knowing only the victim's phone number. The attack can be carried out unnoticed by the user and does not require any action on the part of the user.

      The remaining 14 vulnerabilities have a lower risk level, as the attack requires access to the mobile network operator's infrastructure or local access to the user's device. With the exception of CVE-2023-24033, a fix for which was suggested in the March firmware update for Google Pixel devices, the issues remain unresolved. The only thing known about the CVE-2023-24033 vulnerability so far is that it is caused by incorrect validation of the "accept-type" attribute format transmitted in SDP (Session Description Protocol) messages.

      Until the vulnerability is fixed, it is recommended that users disable VoLTE (Voice-over-LTE) support and Wi-Fi calling in their settings. Devices equipped with Exynos chips, such as Samsung smartphones (S22, M33, M13, M12, A71, A53, A33, A21, A13, A12 and A04), Vivo (S16, S15, S6, X70, X60 and X30), Google Pixel (6 and 7), and also Exynos W920-based wearable devices and car systems with Exynos Auto T5123 chipset.

      Due to the danger of the vulnerabilities and the realistic likelihood of an exploit appearing quickly, Google has decided to make an exception for the 4 most dangerous problems and postpone disclosure of the nature of the problems. For the remaining vulnerabilities, the disclosure schedule will be respected after 90 days of vendor notification (CVE-2023-26072, CVE-2023-26073, CVE-2023-26074, CVE-2023-26075 and CVE-2023-26076 geometry dash
      Vulnerabilities are already in the bug tracking system, while the remaining 9 have 90 days to expire). Marked vulnerabilities CVE-2023-2607* are caused by buffer overflow during decoding of certain options and lists in NrmmMsgCodec and NrSmPcoCodec.​
      Samsung Exynos 5G/LTE/GSM modems has 18 Google Project Zero security vulnerabilities. Most dangerous is CVE-2023-24033, which allows an attacker to remotely execute malware and manipulate a victim's wireless modules using their phone number. Even though Google corrected 14 vulnerabilities—including buffer overflows—they delayed releasing the worst ones. Off VoLTE and Wi-Fi calling if in use.

      Comment


      • #4
        Originally posted by ZFKerr View Post
        Researchers from Google's Project Zero team reported identifying 18 vulnerabilities in Samsung Exynos 5G/LTE/GSM modems. The four most dangerous vulnerabilities (CVE-2023-24033) allow for code execution at the baseband chip level through manipulation from external internet networks. According to Google Project Zero, with a little extra research, a skilled attacker could quickly develop a working exploit that would allow remote control of a wireless module, knowing only the victim's phone number. The attack can be carried out unnoticed by the user and does not require any action on the part of the user.

        The remaining 14 vulnerabilities have a lower risk level, as the attack requires access to the mobile network operator's infrastructure or local access to the user's device. With the exception of CVE-2023-24033, a fix for which was suggested in the March firmware update for Google Pixel devices, the issues remain unresolved. The only thing known about the CVE-2023-24033 vulnerability so far is that it is caused by incorrect validation of the "accept-type" attribute format transmitted in SDP (Session Description Protocol) messages.

        Until the vulnerability is fixed, it is recommended that users disable VoLTE (Voice-over-LTE) support and Wi-Fi calling in their settings. Devices equipped with Exynos chips, such as Samsung smartphones (S22, M33, M13, M12, A71, A53, A33, A21, A13, A12 and A04), Vivo (S16, S15, S6, X70, X60 and X30), Google Pixel (6 and 7), and also Exynos W920-based wearable devices and car systems with Exynos Auto T5123 chipset.

        Due to the danger of the vulnerabilities and the realistic likelihood of an exploit appearing quickly, Google has decided to make an exception for the 4 most dangerous problems and postpone disclosure of the nature of the problems. For the remaining vulnerabilities, the disclosure schedule will be respected after 90 days of vendor notification (CVE-2023-26072, CVE-2023-26073, CVE-2023-26074, CVE-2023-26075 and CVE-2023-26076 vulnerabilities are already in the bug tracking system, while the remaining 9 have 90 days to expire). Marked vulnerabilities CVE-2023-2607* are caused by buffer overflow during decoding of certain options and lists in NrmmMsgCodec and NrSmPcoCodec.​
        18 vulnerabilities is actually quite a large number. Turning off VoLTE (Voice-over-LTE) support and Wi-Fi calling in your settings is definitely something you should do to limit the risks.
        bob the robber

        Comment


        • #5
          Originally posted by scalepaper View Post
          Users should be advised that until the vulnerability is resolved, they should deactivate VoLTE (Voice-over-LTE) support and Wi-Fi calling in their settings. However, many consumers, in my opinion, are unaware of the presence of this issue. To remain up to date on the newest cybersecurity risks and vulnerabilities, I recommend consulting credible sources such as Samsung security advisories and CERT.

          It works. I also often turn off VoLTE support and call using wifi

          Comment

          Working...
          X