Samsung Galaxy Security Alert: Exynos Chip Vulnerability Exploited by Attackers

Sophia Taylor

By Sophia Taylor

Published:

A serious security flaw in Samsung Galaxy devices using certain Exynos chips has raised alarm among cybersecurity experts, according to recent findings from Google’s Threat Analysis Group (TAG).

This vulnerability, identified as CVE-2024-44068, affects various Samsung models, including the Galaxy S10, Galaxy Note 10, Galaxy S20, and other popular Galaxy A and M series models.

Attackers have exploited this flaw to gain elevated privileges on these devices, allowing them to execute code remotely and potentially take control of device functions.

High-Risk Exynos Flaw and Advanced Exploit Chain

The flaw affects Exynos chip versions 9820, 9825, 980, 990, 850, and W920, which are embedded in a range of Samsung devices, including some Galaxy Watches.

Samsung has rated this as a “use-after-free” vulnerability, meaning it originates in how the memory is managed after data has been deleted or “freed.”

This bug is particularly dangerous as it can allow hackers to inject malicious code and manipulate the device in a way that’s usually reserved for trusted apps.

Google’s researchers discovered that this vulnerability has already been exploited in the wild as part of an advanced attack chain. This type of exploit typically requires a series of vulnerabilities working in tandem, known as an exploit chain, which allows attackers to increase their control over the device progressively.

According to Google’s report, the attackers appear to be executing “arbitrary code in a privileged cameraserver process” which they later rename.

This tactic suggests an intentional effort to circumvent standard security checks, allowing the attack to remain unnoticed by standard security tools.

Samsung’s Response and Urgent User Actions

The severity of this vulnerability is underscored by its CVSS rating of 8.1 out of 10, placing it firmly in the high-risk category.

Google’s TAG frequently monitors and responds to such vulnerabilities, especially those involving spyware and nation-state actors who often exploit mobile device weaknesses to monitor specific targets.

This case bears resemblance to previous incidents involving advanced spyware aimed at tracking users through vulnerabilities in mobile devices. According to a recent TAG report, in 2023 alone, at least 61 zero-day vulnerabilities were tracked across popular end-user platforms, highlighting a concerning trend of mobile devices being increasingly targeted.

In response, Samsung released a patch on October 7 as part of its monthly security maintenance update. Users are urged to install this security patch immediately to protect against any potential exploits.

Samsung emphasized the importance of staying updated, noting that regular security updates are a critical measure in preventing such attacks. For maximum security, Samsung recommends enabling automatic updates so that devices always have the latest protections without delay.

Steps to Update Your Samsung Device

To ensure protection against the Exynos vulnerability, Samsung Galaxy users should update their devices with the latest security patch as soon as possible. Follow these steps to manually check for and install updates on your Samsung device:

  1. Open the Settings app.
  2. Scroll down and tap Software update.
  3. Select Download and install to prompt the device to check for the latest updates. If an update is available, follow the on-screen instructions to download and install it.
  4. After the update is installed, your device may need to restart. Once it powers back on, you can go to Settings > About phone > Software information to confirm that your device is running the latest software version.
  5. For added convenience and security, enable Auto download over Wi-Fi in the Software update menu to ensure you receive future updates automatically.

By keeping your device updated, you help protect against known vulnerabilities, ensuring your Samsung Galaxy device remains secure from potential exploits.