First published: Tue Mar 24 2020(Updated: )
An issue was discovered on Samsung mobile devices with N(7.x), O(8.x), and P(9.0) (MSM8996, MSM8998, Exynos7420, Exynos7870, Exynos8890, and Exynos8895 chipsets) software. A heap overflow in the keymaster Trustlet allows attackers to write to TEE memory, and achieve arbitrary code execution. The Samsung ID is SVE-2019-14126 (May 2019).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =7.0 | |
Google Android | =7.1.0 | |
Google Android | =7.1.1 | |
Google Android | =7.1.2 | |
Google Android | =8.0 | |
Google Android | =8.1 | |
Google Android | =9.0 | |
Google Android | ||
Qualcomm MSM8998 | ||
Samsung Exynos 7420 | ||
Samsung Exynos 7870 | ||
Samsung Exynos 8890 | ||
Samsung Exynos 8895 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2019-20607.
Samsung mobile devices with N(7.x), O(8.x), and P(9.0) software, specifically those with MSM8996, MSM8998, Exynos7420, Exynos7870, Exynos8890, and Exynos8895 chipsets, are affected.
CVE-2019-20607 has a severity rating of 9.8, which is considered critical.
This vulnerability allows attackers to achieve arbitrary code execution through a heap overflow in the keymaster Trustlet, which allows them to write to TEE (Trusted Execution Environment) memory.
To fix CVE-2019-20607, it is recommended to apply the security update provided by Samsung. Please refer to the official Samsung security update page for more information.