Pixel smartphones are also affected
In addition to Samsung devices, pixel smartphones are also vulnerable to vulnerabilities in Samsung chips. Only the telephone number is required for an attack.
News

Google’s Project Zero has discovered 18 zero-day vulnerabilities in Samsung’s Exynos modem chips. The affected modems are installed in various smartphones from Samsung, but also from Google and Vivo. They are also used in other devices such as wearables and even in vehicles.
Four of the vulnerabilities (CVE-2023-24033 and three other vulnerabilities that are currently without CVE IDs) are classified as particularly critical because malicious code from the Internet could be executed on the device without user interaction. They allow “Internet-to-Baseband Remote Code Execution”, for which only the telephone number has to be known. For the other 14 vulnerabilities, an attacker must at least have direct access to the device.
Affected Exynos chips and devices
Sea Samsung The chipsets affected by the critical vulnerabilities are Exynos 980, Exynos 1080, Exynos Modem 5123, Exynos Modem 5300 and Exynos Auto T5123.
The Google Project Zero has identified the following devices that are affected by the vulnerabilities based on this information:
- Samsung Smartphones Series S22, M33, M13, M12, A71, A53, A33, A21, A13, A12 and A04
- Vivo-Smartphones der Serien S16, S15, S6, X70, X60 and X30
- Google-Smartphones der Serien Pixel 6 and Pixel 7
- Wearables mit Exynos W920 Chip
- Vehicles with Exynos Auto T5123 chip
Patches und Workarounds
The vulnerabilities were already discovered in late 2022 or early 2023. Samsung has released security updates for it. When these are rolled out on the affected devices also depends on the respective manufacturer. Google closed the CVE-2023-24033 vulnerability in the March update for the Pixel smartphones.
Project Zero proposes a workaround for affected devices that have not yet received a security update. Accordingly, it would be sufficient to deactivate WLAN telephony and Voice-over-LTE (VoLTE). In this way, the vulnerability could not be exploited.
Continue to home pageSource: RSS Feed: Connect – Smartphones by www.connect.de.
*The article has been translated based on the content of RSS Feed: Connect – Smartphones by www.connect.de. If there is any problem regarding the content, copyright, please leave a report below the article. We will try to process as quickly as possible to protect the rights of the author. Thank you very much!
*We just want readers to access information more quickly and easily with other multilingual content, instead of information only available in a certain language.
*We always respect the copyright of the content of the author and always include the original link of the source article.If the author disagrees, just leave the report below the article, the article will be edited or deleted at the request of the author. Thanks very much! Best regards!