Samsung monthly updates: February 2021 patch tackles MITM attacks

SamMobile

SamMobile
SamMobile
Samsung today published the complete changelog detailing
Please, Log in or Register to view URLs content!
which just started rolling out to the company’s Android smartphones earlier within the last few days. While
Please, Log in or Register to view URLs content!
, its follow-up appears to be largely oriented toward tackling various man-in-the-middle attacks.

The good news is that none of the newly resolved device hijacking vulnerabilities were rated as critical security flaws. Meaning Samsung doesn’t believe the said attack vectors were easy to exploit, so we can pretty safely rule out the likelihood that they’ve enabled any large-scale shenanigans.

Which Galaxy smartphones are already receiving the February 2021 security update?​


But between descriptions of wireless carrier impersonation and even a hijacking vulnerability in its
Please, Log in or Register to view URLs content!
,
Please, Log in or Register to view URLs content!
makes for a pretty curious read. If nothing else, it’s an effective reminder of how suspenseful the world of cybersecurity can be, with malicious hackers never lagging too far behind researchers.

Curiously, the only vulnerability with a “High” severity classification that Samsung fixed in this release without Google’s input sounds pretty tame compared to MITM hacks. And yet this issue, manifesting itself in the form of a wallpaper service bug, enables local denial-of-service attacks with quite devastating consequences.

The newly released
Please, Log in or Register to view URLs content!
as all three of the company’s newest flagships have already started receiving the new patch over the weekend, i.e., back in January.
Please, Log in or Register to view URLs content!
less than 24 hours ago,
Please, Log in or Register to view URLs content!
.

The post
Please, Log in or Register to view URLs content!
appeared first on
Please, Log in or Register to view URLs content!
.

Please, Log in or Register to view URLs content!
 

Users who are viewing this thread

Top