Google’s Project Zero team has posted a blog post that paints a pretty scary picture for Pixel and Samsung owners:
In late 2022 and early 2023, Project Zero reported eighteen 0-day vulnerabilities in Exynos Modems produced by Samsung Semiconductor. The four most severe of these eighteen vulnerabilities (CVE-2023-24033 and three other vulnerabilities that have yet to be assigned CVE-IDs) allowed for Internet-to-baseband remote code execution. Tests conducted by Project Zero confirm that those four vulnerabilities allow an attacker to remotely compromise a phone at the baseband level with no user interaction, and require only that the attacker know the victim’s phone number. With limited additional research and development, we believe that skilled attackers would be able to quickly create an operational exploit to compromise affected devices silently and remotely.
The fourteen other related vulnerabilities (CVE-2023-26072, CVE-2023-26073, CVE-2023-26074, CVE-2023-26075, CVE-2023-26076 and nine other vulnerabilities that are yet to be assigned CVE-IDs) were not as severe, as they require either a malicious mobile network operator or an attacker with local access to the device.
The following devices are known to be affected by these exploits:
- Samsung phones including the Galaxy S22 series, the Galaxy M33, M13, M12, A71, A53, A33, A21, A13, A12 and A04
- Vivo phones including the S16, S15, S6, X70, X60 and X30
- Google Pixel 6 and 7 series
- Wearables using the Exynos W920 chipset
- Vehicles that use the Exynos Auto T5123 chipset
That’s a very big list. And I have to wonder what cars use Exynos based modems. I guess we will find out shortly. In any case, the mitigation until updates come out is to turn off Wi-Fi calling and Voice-over-LTE (VoLTE). You should be able to find both of these in the Settings menu under Network & internet > SIMs, though the exact location may vary from device to device. If you have a vehicle that uses this chipset, I have no mitigation for you. And I have no way for you to check your vehicle to see if you have this Exynos chipset.
Expect patches for phones and wearables to come out soon, if they haven’t already. As for vehicles, your guess is as good as mine.
UPDATE:
David Maynor, Senior Director of Threat Intelligence at Cybrary had this to say:
“The flaw in the baseband component is important for enterprise customers to be aware of but not for the reasons it seems. The baseband component is the radio that communicates with cellular infrastructure. The software is a binary blob that’s encrypted, and there are not good ways to inspect the baseband state. So, you have a place you can’t monitor with software you can’t inspect that creates a perfect place for bad guys to do nefarious things.”
Ted Miracco, CEO of Approov followed up with this:
“The discovery of 18 vulnerabilities in Samsung’s Exynos chipsets is deeply unsettling, especially given that four of them enable remote code execution without any user interaction or indication. Overall, the discovery of these vulnerabilities highlights the importance of ongoing security research and the need for vendors to prioritize mobile security in their products. While, It also serves as a reminder for users to remain vigilant and take steps to protect themselves from potential attacks, the fact that an attacker only needs the victim’s phone number to carry out these attacks further highlights the severity of these vulnerabilities.”
Samsung Bans Internal Use of AI After ChatGPT Source Code Leak
Posted in Commentary with tags Samsung on May 3, 2023 by itnerdOn Monday, Bloomberg reported that Samsung notified staff of a new policy banning employee use of AI tools in response to discovering in April that its engineers had accidentally leaked internal source code by uploading it to ChatGPT.
The company is concerned that once data is transmitted to AI platforms it is then stored on external servers, difficult to retrieve and delete, and is then available to other users, according to the document disclosed to Bloomberg.
Furthermore, last month Samsung conducted an internal survey which revealed that 65% of respondents believe the use of AI tools poses a security risk.
Meanwhile, the company claims to be creating its own internal AI tools for translating and summarizing documents as well as for software development. It’s also working on blocking staff’s ability to upload proprietary information to external services.
Other companies that have either banned or restricted the use of AI tools include JPMorgan Chase & Co., Bank of America Corp., Citigroup Inc., Deutsche Bank, Goldman Sachs, and Wells Fargo.
Roy Akerman, Co-Founder & CEO, Rezonate had this comment:
“The wide adoption of AI language models is becoming widely accepted as a means of accelerating delivery of code creation and analysis. Yet, data leakage is most often a by-product of that speed, efficiency, and quality. Developers worldwide are anxious to use these technologies, yet guidance from engineering management has yet to be put in place on the do’s and don’ts of AI usage to ensure data privacy is respected and maintained.
“The aspect of AI consuming all input as source material for others queries presents a black box of uncertainty as to exactly how and where a company’s data would end up and completely upends the tight data security at the heart of most all companies today.
“Blanket restrictions are not a permanent solution and will only limit an organization’s visibility to this problem. Instead, increased control, with education of developers on the cause and effect of using these tools for code reviews, code optimization, debugging and syntax will help harness the technology for the betterment of the organization.”
Clearly there are advantages and benefits to using AI, but there are risks as well. Companies need to weigh those risks so that they aren’t inadvertently creating a situation where AI does more harm than good.
1 Comment »