A serious vulnerability in the Android kernel for their Exynos processors in many of their phones, including the Samsung Galaxy S3, has been found by the Android hacking community. It may be used by any application to root (jailbreak) or unroot the device, brick it or even silently modify arbitrary memory or other applications.
The vulnerability gives the program complete access to device RAM and is being used for rooting devices, but can also be used by a malicious app to take control of the device, disable (brick) it or even silently modify arbitrary memory or other applications.
Samsung is aware of the potential security issue related to the Exynos processor and plans to provide a software update to address it as quickly as possible.
The issue may arise only when a malicious application is operated on the affected devices; however, this does not affect most devices operating credible and authenticated applications.
Samsung will continue to closely monitor the situation until the software fix has been made available to all affected mobile devices.
As Samsung says, users who stick to legitimate apps from legitimate sources are unlikely to encounter this problem, but there have been many cases of malicious software being successfully submitted to the Google Play store.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
2017 State of IT ReportIn today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.