Friday, March 14, 2014

Replicant developers discovered a backdoor on Samsung devices

Not the first time we 



hear that in Android smartphones found some vulnerability that is inherent in a line-up of any particular vendor. Usually this happens because each manufacturer is committed to intervene in the system , having hung it his trademark shell. Sometimes in these shells and find holes. And now developers Replicant our backdoor devices Samsung, but we are not talking about additional software , slightly more serious problem .
Backdoor discovered in radio module . The vulnerable software is responsible for modem devices and RFS- performance teams. By making the necessary instructions , you can get access to the use of read-write function on the device.


Not so bad - so you would think at first glance. After all, Android is good that we can replace almost any software , and even entire firmware entirely. Put Cyanogen Mod, and the problem is solved . Certainly not . Radio is - much more serious thing . The same will be used in the official firmware from Samsung and third party firmware from craftsmen. Precisely because the vulnerability affects a variety of devices . Now we know that some of them Galaxy S, Galaxy S II, Galaxy Note, Galaxy Tab 2 , Galaxy S III, Galaxy Note II , and it is possible that many other gadgets Samsung, working with sim cards . Including the Galaxy Nexus and Google Nexus S. It is interesting - the process can be started with route - rights.

To illustrate this point , the developers showed vulnerability on the machine running Samsung firmware Cyanogen Mod.

No comments :

Post a Comment