Samsung devices running Android versions 9 through 12 could be affected by a serious software vulnerability that allows local applications to mimic system-level activity. Malicious apps have the potential to hijack critical protected functionality through them, giving attackers the ability to factory reset, make phone calls, install/uninstall apps, and weaken HTTPS security — no user approval required.

The CVE-2022-22292 vulnerability was discovered by Kryptowire, a mobile security company, and was communicated to Samsung on November 27, 2021, receiving a “High severity” rating. Samsung patched it through a security update rolled out in February 2022 as part of its ongoing Security Maintenance Release (SMR) process.
The vulnerability’s origin is in the pre-installed Phone app which contains an insecure component allowing local apps to perform system-level operations without user authorization.
Kryptowire recommends that automated mobile security scanning should become a common practice to ensure peace of mind for end-users and businesses.
“Ever think someone else has access to your phone? Unfortunately, you may be right,” said Alex Lisle, CTO of Kryptowire. “Mobile applications are becoming the primary point of personal and professional activity, representing an increasingly attractive target for bad actors.”
RELATED:
- Samsung Galaxy M13 5G appears in live images ahead of launch
- Samsung Galaxy Z Fold4 to come with a single hinge design for more durability
- Samsung Galaxy M62 starts receiving One UI 4.1 update based on Android 12
- Samsung Galaxy S9 series software updates hit the end of the road
- Samsung Galaxy S20 FE 2022 Edition launched with 120Hz AMOLED display, Snapdragon 865, and affordable price







Comments