Show filters
10 Total Results
Displaying 1-10 of 10
Sort by:
Attacker Value
Unknown
CVE-2024-49409
Disclosure Date: November 06, 2024 (last updated November 13, 2024)
Out-of-bounds write in Battery Full Capacity node prior to Firmware update Sep-2024 Release on Galaxy S24 allows local attackers to write out-of-bounds memory. System privilege is required for triggering this vulnerability.
0
Attacker Value
Unknown
CVE-2024-49408
Disclosure Date: November 06, 2024 (last updated November 13, 2024)
Out-of-bounds write in usb driver prior to Firmware update Sep-2024 Release on Galaxy S24 allows local attackers to write out-of-bounds memory. System privilege is required for triggering this vulnerability.
0
Attacker Value
Unknown
CVE-2022-1230
Disclosure Date: March 28, 2023 (last updated February 24, 2025)
This vulnerability allows local attackers to execute arbitrary code on affected installations of Samsung Galaxy S21 prior to 4.5.40.5 phones. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of redirections. An attacker can force a redirection to a site that serves malicious content. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the current user. Was ZDI-CAN-15918.
0
Attacker Value
Unknown
CVE-2022-28793
Disclosure Date: May 03, 2022 (last updated February 23, 2025)
Given the TEE is compromised and controlled by the attacker, improper state maintenance in StrongBox allows attackers to change Android ROT during device boot cycle after compromising TEE. The patch is applied in Galaxy S22 to prevent change of Android ROT after first initialization at boot time.
0
Attacker Value
Unknown
CVE-2021-25424
Disclosure Date: June 11, 2021 (last updated February 22, 2025)
Improper authentication vulnerability in Tizen bluetooth-frwk prior to Firmware update JUN-2021 Release allows bluetooth attacker to take over the user's bluetooth device without user awareness.
0
Attacker Value
Unknown
CVE-2018-16270
Disclosure Date: January 22, 2020 (last updated February 21, 2025)
Samsung Galaxy Gear series before build RE2 includes the hcidump utility with no privilege or permission restriction. This allows an unprivileged process to dump Bluetooth HCI packets to an arbitrary file path.
0
Attacker Value
Unknown
CVE-2018-16272
Disclosure Date: January 22, 2020 (last updated February 21, 2025)
The wpa_supplicant system service in Samsung Galaxy Gear series allows an unprivileged process to fully control the Wi-Fi interface, due to the lack of its D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
0
Attacker Value
Unknown
CVE-2018-16271
Disclosure Date: January 22, 2020 (last updated February 21, 2025)
The wemail_consumer_service (from the built-in application wemail) in Samsung Galaxy Gear series allows an unprivileged process to manipulate a user's mailbox, due to improper D-Bus security policy configurations. An arbitrary email can also be sent from the mailbox via the paired smartphone. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
0
Attacker Value
Unknown
CVE-2018-16269
Disclosure Date: April 02, 2019 (last updated February 21, 2025)
The wnoti system service in Samsung Galaxy Gear series allows an unprivileged process to take over the internal notification message data, due to improper D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
0
Attacker Value
Unknown
CVE-2012-6422
Disclosure Date: December 18, 2012 (last updated October 05, 2023)
The kernel in Samsung Galaxy S2, Galaxy Note 2, MEIZU MX, and possibly other Android devices, when running an Exynos 4210 or 4412 processor, uses weak permissions (0666) for /dev/exynos-mem, which allows attackers to read or write arbitrary physical memory and gain privileges via a crafted application, as demonstrated by ExynosAbuse.
0