First published: Mon Jun 03 2019(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samsung Galaxy S9 prior to January 2019 Security Update (SMR-JAN-2019 - SVE-2018-13467). User interaction is required to exploit this vulnerability in that the target must connect to a wireless network. The specific flaw exists within the captive portal. By manipulating HTML, an attacker can force a page redirection. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7476.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samsung Galaxy S9 Firmware | <2019-01 | |
Samsung Galaxy S9 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6741 is a vulnerability that allows remote attackers to execute arbitrary code on vulnerable installations of Samsung Galaxy S9 prior to January 2019 Security Update.
CVE-2019-6741 has a severity score of 9.3, which is classified as critical.
Yes, user interaction is required to exploit CVE-2019-6741 as the target must connect to a wireless network.
Vulnerable installations of Samsung Galaxy S9 prior to January 2019 Security Update (SMR-JAN-2019 - SVE-2018-13467) are affected by CVE-2019-6741.
To fix CVE-2019-6741, update your Samsung Galaxy S9 to the January 2019 Security Update (SMR-JAN-2019 - SVE-2018-13467) or later versions.