January 26, 2023

Jan 23, 2023Ravie LakshmananCellular Hacking / App Safety

Two safety flaws have been disclosed in Samsung’s Galaxy Retailer app for Android that may very well be exploited by an area attacker to stealthily set up arbitrary apps or direct potential victims to fraudulent touchdown pages on the internet.

The problems, tracked as CVE-2023-21433 and CVE-2023-21434, had been discovered by NCC Group and notified to the South Korean chaebol in November and December 2022. Samsung classified the bugs as average threat and launched fixes in model 4.5.49.8 shipped earlier this month.

Samsung Galaxy Retailer, beforehand generally known as Samsung Apps and Galaxy Apps, is a devoted app retailer used for Android units manufactured by Samsung. It was launched in September 2009.

The primary of the 2 vulnerabilities is CVE-2023-21433, which may allow an already put in rogue Android app on a Samsung system to put in any utility out there on the Galaxy Retailer.

Samsung described it as a case of improper entry management that it mentioned has been patched with correct permissions to stop unauthorized entry.

It is price noting right here that the shortcoming solely impacts Samsung units which are working Android 12 and earlier than, and doesn’t have an effect on these which are on the most recent model (Android 13).

The second vulnerability, CVE-2023-21434, pertains to an occasion of improper enter validation occurring when limiting the checklist of domains that may very well be launched as a WebView from inside the app, successfully enabling a risk actor to bypass the filter and browse to a website beneath their management.

“Both tapping a malicious hyperlink in Google Chrome or a pre-installed rogue utility on a Samsung system can bypass Samsung’s URL filter and launch a webview to an attacker managed area,” NCC Group researcher Ken Gannon mentioned.

The replace comes as Samsung rolled out safety updates for the month of January 2023 to remediate several flaws, a few of which may very well be exploited to switch provider community parameters, management BLE promoting with out permission, and obtain arbitrary code execution.

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we publish.