In Knox SDS IAM (Identity Access Management) and EMM (Enterprise Mobility Management) 16.11 on Samsung mobile devices, a man-in-the-middle attacker can install any application into the Knox container (without the user's knowledge) by inspecting network traffic from a Samsung server and injecting content at a certain point in the update sequence. This installed application can further leak information stored inside the Knox container to the outside world.
References
Link | Resource |
---|---|
https://gist.github.com/e96e02/12ce905e3b724954273dd7d543a968f1 | Third Party Advisory |
https://www.lgsinnovations.com/lgs-innovations-discovers-samsung-mobile-product-security-vulnerability/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2018-02-20 19:29
Updated : 2024-02-28 16:25
NVD link : CVE-2017-10963
Mitre link : CVE-2017-10963
CVE.ORG link : CVE-2017-10963
JSON object : View
Products Affected
samsung
- knox_enterprise_mobility_management
- knox_identity_access_management
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')