Home » IT Security: Android is beneath menace – a brand new safety gap in Samsung Android

IT Security: Android is beneath menace – a brand new safety gap in Samsung Android

by admin
IT Security: Android is beneath menace – a brand new safety gap in Samsung Android

There is a present safety alert for Samsung Android. Several vulnerabilities have been recognized. You can learn right here what threatens the IT safety of Android techniques, how excessive the chance degree is and what to do about it.

Federal workplace for Security in Information Technology (BSI) has revealed a safety advisory for Samsung Android on June 3, 2024. The report lists a number of vulnerabilities that make the assault potential. The safety vulnerability impacts the Android working system and the Samsung Android product.

The newest producer suggestions for updates, workarounds and safety patches for this vulnerability could be discovered right here: Samsung Mobile Security (Stop: 03.06.2024).

Many Samsung Android vulnerabilities have been reported – Risk: excessive

Risk degree: 5 (excessive)
CVSS Base Score: 8.8
CVSS provisional rating: 7,7
Remote management: Ja

The Common Vulnerability Scoring System (CVSS) is used to evaluate the vulnerability of pc techniques. The CVSS commonplace makes it potential to check potential or precise safety dangers based mostly on numerous metrics with a view to prioritize countermeasures. The attributes “none”, “low”, “medium”, “excessive” and “extreme” are used to find out the severity ranges of vulnerability. The Base Score evaluates the necessities of an assault (together with authentication, complexity, privileges, consumer interplay) and its outcomes. Temporal scores additionally keep in mind adjustments over time within the threat scenario. The threat of the vulnerability talked about right here is assessed as “excessive” in response to the CVSS with a base rating of 8.8.

Samsung Android Bug: Implications of exploiting the present vulnerability

The Android working system is an open supply platform for cell gadgets. The base is the Linux kernel.

See also  WLAN router in the test: The Vodafone GigaCube put to the test

An attacker can exploit many vulnerabilities in Samsung Android to escalate privileges, execute malicious code, expose delicate data, or spoof information.

Vulnerabilities are recognized by distinctive CVE (Common Vulnerabilities and Exposures) numbers. CVE-2024-20873, CVE-2024-20874, CVE-2024-20875, CVE-2024-20876, CVE-2024-20878, CVE-2024-202087292, CVE-208729 2024-20881, CVE -2024-20882, CVE-2024-20883, CVE-2024-20884 and CVE-2024-20885 on the market.

Systems affected by the safety hole at a look

working system
Android

Products
Samsung Android 12 Samsung Android 13 Samsung Android 14

General suggestions for coping with IT vulnerabilities

  1. Users of the affected apps ought to keep up-to-date. When safety holes are identified, producers are required to repair them shortly by growing a patch or workaround. If safety patches can be found, set up them instantly.
  2. For data, see the sources listed within the subsequent part. This usually incorporates further details about the most recent model of the software program in query and the supply of safety patches or efficiency suggestions.
  3. If you might have any additional questions or uncertainties, please contact your accountable administrator. IT safety managers ought to often examine the required sources to see if a brand new safety replace is obtainable.

Manufacturer details about updates, patches and workarounds

Here one can find some hyperlinks with details about bug stories, safety fixes and workarounds.

Samsung Mobile Security from 2024-06-03 (03.06.2024)
For extra data, see:

Version historical past of this safety alert

This is the primary model of this Samsung Android IT safety discover. If updates are introduced, this doc might be up to date. You can examine adjustments or additions on this model historical past.

See also  3DMark Speed ​​Way is developed with DirectX 12 Ultimate with instant ray tracing global lighting and reflection effects

June 3, 2024 – First model

+++ Editorial observe: This doc relies on present BSI knowledge and might be up to date in a data-driven method relying on the standing of the alert. We welcome suggestions and feedback at [email protected]. +++

comply with News.de you might be right here Facebook, Twitter, Pinterest once more YouTube? Here one can find sizzling information, present movies and a direct line to the editorial group.

kns/roj/information.de

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More

Privacy & Cookies Policy