{"id":11708,"date":"2023-03-21T06:59:13","date_gmt":"2023-03-21T06:59:13","guid":{"rendered":"https:\/\/infolight.ua\/2023\/03\/21\/a-vulnerability-has-been-discovered-in-phones-based-on-exynos-chips-manufactured-by-samsung-it-is-recommended-to-disable-wi-fi-calls\/"},"modified":"2024-05-15T22:40:07","modified_gmt":"2024-05-15T22:40:07","slug":"a-vulnerability-has-been-discovered-in-phones-based-on-exynos-chips-manufactured-by-samsung-it-is-recommended-to-disable-wi-fi-calls","status":"publish","type":"post","link":"https:\/\/infolight.ua\/en\/2023\/03\/21\/a-vulnerability-has-been-discovered-in-phones-based-on-exynos-chips-manufactured-by-samsung-it-is-recommended-to-disable-wi-fi-calls\/","title":{"rendered":"A vulnerability has been discovered in phones based on Exynos chips manufactured by Samsung &#8211; it is recommended to disable Wi-Fi calls"},"content":{"rendered":"\n<p>The Project Zero team of security analysts working at Google, <strong>\n  <a href=\"https:\/\/googleprojectzero.blogspot.com\/2023\/03\/multiple-internet-to-baseband-remote-rce.html\" target=\"_blank\" rel=\"noreferrer noopener\">has published <\/a>\n<\/strong>a report that a critical vulnerability has been discovered in some smartphones and smartwatches based on Exynos chips manufactured by Samsung Semiconductor. By exploiting this vulnerability, attackers can remotely compromise a phone without user interaction, and the attack only requires the attacker to know the victim&#8217;s phone number.  <\/p>\n\n<p>Samsung Semiconductor&#8217;s advisory provides a list of Exynos chipsets affected by these vulnerabilities. Based on information from publicly available websites that display chipsets for devices, the affected products likely include:<\/p>\n\n<ul class=\"wp-block-list\">\n<li>Mobile devices from Samsung, including the S22, M33, M13, M12, A71, A53, A33, A21s, A13, A12, and A04 series, Samsung Galaxy Watch 4, and Samsung Galaxy Watch 5;<\/li>\n\n\n\n<li>Mobile devices from Vivo, including the S16, S15, S6, X70, X60, and X30 series;<\/li>\n\n\n\n<li>Pixel 6 and Pixel 7 series devices from Google;  <\/li>\n\n\n\n<li>any devices, including cars, that use the Exynos Auto T5123 chipset.<\/li>\n<\/ul>\n\n<p>Users are advised to immediately install the latest updates that Google has already released for their devices or disable Wi-Fi and Voice-over-LTE (VoLTE) calls in their device settings.<\/p>\n\n<p>The Project Zero website also reports that  <em>&#8220;According to our standard disclosure policy, Project Zero discloses security vulnerabilities within a set time after notifying the software or hardware vendor. In some rare cases, when we have assessed that attackers would benefit significantly more than defenders if a vulnerability were disclosed, we make an exception to our policy and delay disclosure of that vulnerability.&#8221;<\/em>  This means that the discovered vulnerability is extremely dangerous.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Project Zero team of security analysts working at Google, has published a report that a critical vulnerability has been [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":10187,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","_eb_data_table":"","_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"wds_primary_category":0,"footnotes":""},"categories":[1279,1307,1291],"tags":[1393],"class_list":["post-11708","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information-security","category-technology","category-world","tag-information-security"],"jetpack_featured_media_url":"https:\/\/infolight.ua\/wp-content\/uploads\/2023\/03\/depositphotos_56281151_xl.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/infolight.ua\/en\/wp-json\/wp\/v2\/posts\/11708","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infolight.ua\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infolight.ua\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infolight.ua\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/infolight.ua\/en\/wp-json\/wp\/v2\/comments?post=11708"}],"version-history":[{"count":1,"href":"https:\/\/infolight.ua\/en\/wp-json\/wp\/v2\/posts\/11708\/revisions"}],"predecessor-version":[{"id":11709,"href":"https:\/\/infolight.ua\/en\/wp-json\/wp\/v2\/posts\/11708\/revisions\/11709"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infolight.ua\/en\/wp-json\/wp\/v2\/media\/10187"}],"wp:attachment":[{"href":"https:\/\/infolight.ua\/en\/wp-json\/wp\/v2\/media?parent=11708"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infolight.ua\/en\/wp-json\/wp\/v2\/categories?post=11708"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infolight.ua\/en\/wp-json\/wp\/v2\/tags?post=11708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}