Security

Cyber-crime

Samsung phone users under attack, Google warns

Don't ignore this nasty zero day exploit says TAG


A nasty bug in Samsung's mobile chips is being exploited by miscreants as part of an exploit chain to escalate privileges and then remotely execute arbitrary code, according to Google security researchers.

The use-after-free vulnerability is tracked as CVE-2024-44068, and it affects Samsung Exynos mobile processors versions 9820, 9825, 980, 990, 850, and W920. It received an 8.1 out of 10 CVSS severity rating, and Samsung, in its very brief security advisory, describes it as a high-severity flaw. The vendor patched the hole on October 7.

While the advisory doesn't make any mention of attackers abusing the vulnerability, according to Googlers Xingyu Jin and Clement Lecigene, someone(s) has already chained the flaw with other CVEs (those aren't listed) as part of an attack to execute code on people's phones.

The bug exists in the memory management and how the device driver sets up the page mapping, according to Lecigene, a member of Google's Threat Analysis Group, and Jin, a Google Devices and Services Security researcher who is credited with spotting the flaw and reporting it to Samsung.

"This 0-day exploit is part of an EoP chain," the duo said. "The actor is able to execute arbitrary code in a privileged cameraserver process. The exploit also renamed the process name itself to 'vendor.samsung.hardware.camera.provider@3.0-service,' probably for anti-forensic purposes."

The Register reached out to Samsung for more information about the flaw and in-the-wild exploits, but did not immediately receive a response. A spokesperson later told us via email, "Samsung is committed to providing the highest level of security for our users. We are aware of the potential security vulnerability mentioned.

"To address this, Samsung has begun rolling out security patches as part of our monthly security maintenance release. We strongly recommend that users keep their devices up-to-date with the latest software updates."

It's worth noting that Google TAG keeps a close eye on spyware and nation-state gangs abusing zero-days for espionage purposes. 

Considering that both of these threats frequently attack mobile devices to keep tabs on specific targets — Google tracked [PDF] 61 zero-days in the wild that specifically targeted end-user platforms and products in 2023 - we wouldn't be too surprised to hear that the exploit chain including CVE-2024-44068 ultimately deploys some snooping malware on people's phones. ®

Editor's note: This story was amended post-publication with comment from Samsung.

Send us news
10 Comments

Belgian cops cuff 2 suspected cybercrooks in Redline, Meta infostealer sting

US also charges an alleged Redline dev, no mention of an arrest

UK councils bat away DDoS barrage from pro-Russia keyboard warriors

Local authority websites downed in response to renewed support for Ukraine

LottieFiles supply chain attack exposes users to malicious crypto wallet drainer

A scary few Halloween hours for team behind hugely popular web plugin

Russian spies use remote desktop protocol files in unusual mass phishing drive

The prolific Midnight Blizzard crew cast a much wider net in search of scrummy intel

Dutch cops pwn the Redline and Meta infostealers, leak 'VIP' aliases

Legal proceedings underway with more details to follow

Senator accuses sloppy domain registrars of aiding Russian disinfo campaigns

Also, Change Healthcare sets a record, cybercrime cop suspect indicted, a new Mallox decryptor, and more

Google Cloud burst by 12-hour power outage in German region

Loose juice led to cooling issue in one zone, but the pain was widespread

Samsung's HBM3E has been a disaster, but there's a path back

274% profit increase belies missed deadlines, botched launches, and scrambling leadership

Akira ransomware is encrypting victims again following pure extortion fling

Crooks revert to old ways for greater efficiency

Pixel perfect Ghostpulse malware loader hides inside PNG image files

Miscreants combine it with an equally tricky piece of social engineering

Samsung blames 'one-off costs' as Q3 chip profits plummet 40%

Unexpected expenses in semiconductor division overshadow revenue gains

Healthcare Services Group discloses 'cybersecurity incident' in SEC filing

Laundry and dining provider still investigating cause and scope