Home

Share this Story

Samsung Issues Statement Regarding Exynos Exploit, Software Fix On The Way

Over the weekend, an exploit was found within Samsung’s Exynos processor that powers many devices, including the new Galaxy S3 and Galaxy Note 2. The exploit, if used by a malicious application, could potentially take control of the device’s RAM, which would spell serious trouble for owners. 

Samsung has acknowledged the “potential security issue” and plan to provide a software update very soon to fix the issue:

Samsung is aware of the potential security issue related to the Exynos processor and plans to provide a software update to address it as quickly as possible.

The issue may arise only when a malicious application is operated on the affected devices; however, this does not affect most devices operating credible and authenticated applications.

Samsung will continue to closely monitor the situation until the software fix has been made available to all affected mobile devices.

If waiting for Samsung to issue an official fix doesn’t sound good enough, then developers released a fix of their own until Samsung can catch up. An application, which does not need root access, can fix the exploit in seconds if you are worried about your device’s security. Feel free to download that here. All actions are completely reversible so don’t worry about hurting your phone.

Until then, stop downloading apps from untrustworthy sources.

Via: Android Central

  • snowblind64

    I posted about this a couple days ago. Too bad it disables your FFC but at least it can be toggled. Odd that Samsung would use camera drivers that need access to normally protected file system areas.

  • sogajeffrey

    Verizon S3 with Jellybean unaffected by this :)

    • CapnShiner

      I was going to post this. More people need to realize this before they start freaking out. The Verizon GS3 has a Qualcomm Snapdragon CPU, not a Samsung Exynos CPU.

    • Scott

      As do all US S3 varieties (AT&T, Sprint, T-Mobile, US Cellular, etc.)

  • DroidModderX

    Chainfires exynos abuse app will work as a one click root app and will patch the exploit as well. https://www.youtube.com/watch?v=G2_zHqsC4BE&feature=youtube_gdata_playerp

  • http://www.facebook.com/profile.php?id=716789798 Lonnie Kerchief

    And Google trends shows mobile searches for “phat booty bitches” going down and desktop searches for it on the rise.

  • kane

    Since everyone’s phone is rooted and unlocked (right?) can we just use another kernel and not care? “Unauthorized apps” has to be checked for Titanium Backup to work and I’m sure some others do.

    • michael arazan

      I use avast to scan all my apps installed or side loaded not from the play store.

  • Thomas

    Is the Droid Life app safe ? ;)

    • http://www.droid-life.com/ Tim-o-tato

      Long answer – We appreciate your feedback regarding concerns of the official Droid Life application that is found in Google Play for Android devices and its safety. Until evidence of a potential risk occurs, we will ask that you continue to visit Droid Life through either Google Currents or our website through your mobile browser. Again, we appreciate your concerns and look forward to serving you in the future for your Android news needs.

      Short answer – Nope.

      • Thomas

        Dude..nice corporate response. Look at you sounding all professional & what not.

        • http://twitter.com/davidbavin David Bavin

          Yeah I hate when people/companies do that

      • KOBALT

        I use the DL app all day, every day. I literally check at least every hour. I’d gladly pay for a Premium version.

  • http://www.linkedin.com/in/PhilHamlin Phil Hamlin

    “Until then, stop downloading apps from untrustworthy sources.”

    Probably decent advice regardless of whether or not your phone is affected by this undocumented feature.