SB2024110618 - Multiple vulnerabilities in Samsung Android Applications



SB2024110618 - Multiple vulnerabilities in Samsung Android Applications

Published: November 6, 2024

Security Bulletin ID SB2024110618
Severity
Low
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Physical access
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Improper access control (CVE-ID: CVE-2024-49403)

The vulnerability allows a local attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. An attacker with physical access can bypass implemented security restrictions and access recording files on the lock screen.


2) Improper access control (CVE-ID: CVE-2024-49404)

The vulnerability allows a local attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. An attacker with physical access can bypass implemented security restrictions and access video file of other users.


3) Improper Authentication (CVE-ID: CVE-2024-49405)

The vulnerability allows a local attacker to bypass authentication process.

The vulnerability exists due to an error when processing authentication requests in Private Info. An attacker with physical access can bypass authentication process and access sensitive information in a specific scenario.


4) Improper validation of integrity check value (CVE-ID: CVE-2024-49406)

The vulnerability allows a local user to compromise the target system.

The vulnerability exists due to improper validation of integrity check value. A local administrator can modify transaction.


5) Improper access control (CVE-ID: CVE-2024-49407)

The vulnerability allows a local attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. An attacker with physical access can bypass implemented security restrictions and access data across multiple user profiles.


Remediation

Install update from vendor's website.