April 30, 2026 09:43 am (IST)
Follow us:
facebook-white sharing button
twitter-white sharing button
instagram-white sharing button
youtube-white sharing button
Exit Polls Give Bengal to BJP—But One Survey Begs to Differ | Big defence push: Rajnath Singh to hold high-stakes talks with Italy’s Defence Minister | “Voting without fear”: PM Modi hails record turnout in West Bengal polls | Mamata Banerjee trying to intimidate Hindu voters, alleges Suvendu Adhikari in Bhabanipur | Operation Sindoor boost: India is now fifth-largest military spender at USD 92.1 billion in 2025, Pakistan's spending is also up | ‘Got the guts?’ Derek O’Brien dares Modi to quit if Mamata Banerjee wins Bengal polls | ECI ‘harassing’ TMC, dancing to BJP’s tune: Mamata Banerjee in Bhabanipur | ‘Nothing like playing football’: PM Modi unwinds in Sikkim after Bengal poll blitz | Crackdown on D-Company: Dawood aide Salim Dola deported to India | Mumbai horror: Man asks two security guards to recite ‘kalma’, then stabs them
Photo courtesy: samsung.com

Centre warns Samsung phone users of major security threats

| @indiablooms | Dec 16, 2023, at 06:25 am

New Delhi: The Centre has issued a high-security alert for Samsung Galaxy phone users.

The Indian Computer Emergency Response Team (CERT-In) released a security advisory on Wednesday highlighting multiple vulnerabilities impacting various models of Samsung Galaxy phones.

These vulnerabilities have been categorized as high-risk, emphasizing the critical importance for Samsung users to promptly update their phone operating systems.

According to the report, Samsung Mobile Android versions 11, 12, 13, and 14 are susceptible to potential security threats.

The attackers can bypass implemented security restrictions, access sensitive information and execute arbitrary code on the targeted system in the Samsung mobiles of the specified versions.

“These vulnerabilities exist due to improper access control flaw in KnoxCustomManagerService and SmartManagerCN component, integer overflow vulnerability in facepreprocessing library; improper authorization verification vulnerability in AR Emoji, improper exception management vulnerability in Knox Guard, various out of bounds write vulnerabilities in bootloader, HDCP in HAL, libIfaaCa and libsavsac.so components, improper size check vulnerability in softsimd, improper input validation vulnerability in Smart Clip and implicit intent hijacking vulnerability in contacts,” the agency said.

Attackers can take advantage of these vulnerabilities and harm the users by causing a heap overflow or a stack-based buffer overflow.

This might let them get into the device's SIM PIN, send broadcasts with more power, read the sandbox data of AR Emoji, get around the Knox Guard lock by changing the system time, access any files they want, find sensitive information, run any code they want, and take control of the targeted system.

Support Our Journalism

We cannot do without you.. your contribution supports unbiased journalism

IBNS is not driven by any ism- not wokeism, not racism, not skewed secularism, not hyper right-wing or left liberal ideals, nor by any hardline religious beliefs or hyper nationalism. We want to serve you good old objective news, as they are. We do not judge or preach. We let people decide for themselves. We only try to present factual and well-sourced news.

Support objective journalism for a small contribution.