Google warns of a vulnerability that allows Android smartphones to be attacked with just a phone number
In which, there are 4 particularly serious vulnerabilities, which can compromise the device 'remotely and quietly' with just the victim's phone number without their interaction.
These vulnerabilities have the ability to remotely run code at the baseband level of the device, allowing hackers to access data in and out of the device with almost no obstruction. Attackers can access data including cell phone calls, text messages, and mobile data.
Google further warned that experienced attackers without a lot of resources can quickly exploit the vulnerability.
Project Zero expert Maddie Stone said that Samsung had 90 days to patch the vulnerability, but the company was unable to complete it.
Samsung has also confirmed that some Exynos modems have vulnerabilities that affect several Android device manufacturers, but did not provide details.
According to Project Zero, there are nearly 12 models of Samsung, Vivo, Google Pixel 6 and Pixel 7 affected devices including Samsung S22, M33, M13, M12, A71, A53, A33, A21s, A13, A12 and A04; Vivo S16, S15, S6, X70, X60 and X30; Google Pixel 6, Pixel 7; Vehicles using Exynos Auto T5123 chip.
Patches for each device family will be rolled out depending on the manufacturer. Recently, Google rolled out a patch for Pixel phones in the March security update.
To eliminate the risk of exploiting the vulnerability, Google recommends that users protect themselves by turning off Wi-Fi and VoLTE calling on their devices, before the vendors release patches.
You should read it
- AMD CPUs also have security vulnerabilities that have existed for many years now!
- New vulnerability on MediaTek chip makes 30% of Android smartphones can be eavesdropped
- Detected a serious BIOS vulnerability, affecting many Intel processors
- New zero-day vulnerability warning in Windows Search, Windows protocol nightmare getting worse
- Microsoft urgently patched zero-day vulnerability after 2 years of refusing to acknowledge it
- What to do to protect the device from ZombieLoad attack?
- 12-year vulnerability in pkexec gives hackers root privileges on Linux
- Detected a serious zero-day vulnerability in Microsoft Office, click the document file and it will stick
- 'Printer Catastrophe' Vulnerability Threatens All Versions of Windows
- What is VENOM Vulnerability? How can you protect yourself?
- Log4Shell zero-day vulnerability discovered, the new nightmare of enterprises
- Detects a vulnerability that threatens all Windows computers shipped from 2012 up to now
Maybe you are interested
How to fix hidden templates in Google Docs
How to Create a Budget Spreadsheet in Google Sheets
How to recover deleted Viber messages using Google Drive, iCloud
Google Labs Releases Whisk: A Tool That Allows You to Upload Images as Instructions Instead of Text Prompts
10 Google Photos Tips and Tricks You Shouldn't Miss
Google Announces Android XR, a New OS Platform for AR and VR Glasses