Two security flaws have been disclosed in Samsung’s Galaxy Retailer app for Android that could be exploited by a nearby attacker to stealthily put in arbitrary applications or direct possible victims to fraudulent landing webpages on the web.
The issues, tracked as CVE-2023-21433 and CVE-2023-21434, were being found out by NCC Team and notified to the South Korean chaebol in November and December 2022. Samsung categorized the bugs as average risk and unveiled fixes in edition 4.5.49.8 shipped previously this thirty day period.
Samsung Galaxy Retail outlet, previously recognised as Samsung Applications and Galaxy Applications, is a focused app store used for Android equipment created by Samsung. It was launched in September 2009.
The initial of the two vulnerabilities is CVE-2023-21433, which could allow an presently installed rogue Android app on a Samsung gadget to install any software obtainable on the Galaxy Shop.
Samsung explained it as a situation of improper accessibility command that it explained has been patched with appropriate permissions to prevent unauthorized entry.
It truly is worth noting here that the shortcoming only impacts Samsung products that are jogging Android 12 and in advance of, and does not influence those that are on the most current model (Android 13).
The 2nd vulnerability, CVE-2023-21434, relates to an occasion of incorrect input validation developing when restricting the record of domains that could be introduced as a WebView from inside of the app, correctly enabling a danger actor to bypass the filter and browse to a area under their command.
“Both tapping a malicious hyperlink in Google Chrome or a pre-set up rogue application on a Samsung system can bypass Samsung’s URL filter and start a webview to an attacker managed domain,” NCC Group researcher Ken Gannon reported.
The update arrives as Samsung rolled out security updates for the thirty day period of January 2023 to remediate many flaws, some of which could be exploited to modify provider network parameters, manage BLE advertising and marketing without having authorization, and attain arbitrary code execution.
Identified this short article appealing? Comply with us on Twitter and LinkedIn to browse much more exclusive content material we write-up.
Some parts of this article are sourced from:
thehackernews.com