Google Mission Zero Researcher Uncovers Zero-Click on Exploit Concentrating on Samsung Gadgets

Jan 10, 2025Ravie LakshmananCybersecurity / Android

Cybersecurity researchers have detailed a now-patched safety flaw impacting Monkey’s Audio (APE) decoder on Samsung smartphones that might result in code execution.

The high-severity vulnerability, tracked as CVE-2024-49415 (CVSS rating: 8.1), impacts Samsung units working Android variations 12, 13, and 14.

“Out-of-bounds write in libsaped.so prior to SMR Dec-2024 Release 1 allows remote attackers to execute arbitrary code,” Samsung stated in an advisory for the flaw launched in December 2024 as a part of its month-to-month safety updates. “The patch adds proper input validation.”

Google Mission Zero researcher Natalie Silvanovich, who found and reported the shortcoming, described it as requiring no consumer interplay to set off (i.e., zero-click) and a “fun new attack surface” below particular situations.

Significantly, this works if Google Messages is configured for wealthy communication providers (RCS), the default configuration on Galaxy S23 and S24 telephones, because the transcription service domestically decodes incoming audio earlier than a consumer interacts with the message for transcription functions.

Cybersecurity

“The function saped_rec in libsaped.so writes to a dmabuf allocated by the C2 media service, which always appears to have size 0x120000,” Silvanovich defined.

“While the maximum blocksperframe value extracted by libsapedextractor is also limited to 0x120000, saped_rec can write up to 3 * blocksperframe bytes out, if the bytes per sample of the input is 24. This means that an APE file with a large blocksperframe size can substantially overflow this buffer.”

In a hypothetical assault situation, an attacker may ship a specifically crafted audio message through Google Messages to any goal gadget that has RCS enabled, inflicting its media codec course of (“samsung.software.media.c2”) to crash.

Samsung’s December 2024 patch additionally addresses one other high-severity vulnerability in SmartSwitch (CVE-2024-49413, CVSS rating: 7.1) that might permit native attackers to put in malicious functions by making the most of improper verification of cryptographic signature.

Discovered this text fascinating? Observe us on Twitter and LinkedIn to learn extra unique content material we publish.

Recent articles

U.S. Sanctions Chinese language Cybersecurity Agency Over Treasury Hack Tied to Silk Hurricane

The U.S. Treasury Division's Workplace of International Property Management...

FTC cracks down on Genshin Impression gacha loot field practices

Genshin Impression developer Cognosphere (aka Hoyoverse)...

New ‘Sneaky 2FA’ Phishing Package Targets Microsoft 365 Accounts with 2FA Code Bypass

Jan 17, 2025Ravie LakshmananCybersecurity / Menace Intelligence Cybersecurity researchers have...