CVE-2019-11341

On certain Samsung P(9.0) phones, an attacker with physical access can start a TCP Dump capture without the user's knowledge. This feature of the Service Mode application is available after entering the *#9900# check code, but is protected by an OTP password. However, this password is created locally and (due to mishandling of cryptography) can be obtained easily by reversing the password creation logic.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*
cpe:2.3:h:samsung:phone:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:20

Type Values Removed Values Added
References () https://drfone.wondershare.com/unlock/samsung-galaxy-secret-code-list.html - Third Party Advisory () https://drfone.wondershare.com/unlock/samsung-galaxy-secret-code-list.html - Third Party Advisory
References () https://security.samsungmobile.com/securityUpdate.smsb - Not Applicable () https://security.samsungmobile.com/securityUpdate.smsb - Not Applicable
References () https://twitter.com/fs0c131y/status/1115889065285562368 - Exploit, Third Party Advisory () https://twitter.com/fs0c131y/status/1115889065285562368 - Exploit, Third Party Advisory

Information

Published : 2019-10-09 16:15

Updated : 2024-11-21 04:20


NVD link : CVE-2019-11341

Mitre link : CVE-2019-11341

CVE.ORG link : CVE-2019-11341


JSON object : View

Products Affected

google

  • android

samsung

  • phone
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm