The Latest in IT Security

Samsung TouchWiz Devices Vulnerable to Mischief

26
Sep
2012

Saw this tweet yesterday on Twitter:

@ceoStephenElop

The account is a parody… but the “tel:*2767*3855%23” is quite serious.

It’s a reference to a “vulnerability” which exists on some versions of Samsung Android phones, those running Samsung’s TouchWiz UI. (So, not Nexus.) And by vulnerability, we mean that some “genius” developed a feature to factory hard reset TouchWiz devices using an Unstructured Supplementary Service Data (USSD) code — without requiring a prompt from the user!

As such, there are numerous ways in which a device could be remotely targeted and prompted to run service commands.

The vulnerability was demonstrated by Ravi Borgaonkar last weekend at the Ekoparty security conference, which you can see here.

The good news is that Borgaonkar informed Samsung in June. Current versions of Galaxy S III firmware should not be vulnerable.

Remote wipe via iframe USSD trigger

Also good news: remote factory hard resets don’t exactly have a profit motive. So this isn’t something anybody will likely ever see in the wild. But still, if you have a Samsung running TouchWiz, make sure you update to the latest firmware.

Also, other vendor’s phones could be subject to similar issues. One workaround to consider is a third-party dialer app.

Leave a reply


Categories

THURSDAY, APRIL 25, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments