First published: Mon Jun 03 2019(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samsung Galaxy S9 prior to 1.4.20.2. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the GameServiceReceiver update mechanism. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7477.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samsung Galaxy S9 Firmware | <1.4.20.2 | |
Samsung Galaxy S9 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Samsung Galaxy S9 vulnerability is CVE-2019-6742.
The severity of CVE-2019-6742 is critical (score 10).
Remote attackers can exploit CVE-2019-6742 to execute arbitrary code on vulnerable installations of Samsung Galaxy S9.
No, authentication is not required to exploit CVE-2019-6742.
To fix this vulnerability, update your Samsung Galaxy S9 firmware version to 1.4.20.2 or later.