On certain Samsung P(9.0) phones, an attacker with physical access can start a TCP Dump capture without the user's knowledge. This feature of the Service Mode application is available after entering the *#9900# check code, but is protected by an OTP password. However, this password is created locally and (due to mishandling of cryptography) can be obtained easily by reversing the password creation logic.
References
Link | Resource |
---|---|
https://drfone.wondershare.com/unlock/samsung-galaxy-secret-code-list.html | Third Party Advisory |
https://security.samsungmobile.com/securityUpdate.smsb | Not Applicable |
https://twitter.com/fs0c131y/status/1115889065285562368 | Exploit Third Party Advisory |
https://drfone.wondershare.com/unlock/samsung-galaxy-secret-code-list.html | Third Party Advisory |
https://security.samsungmobile.com/securityUpdate.smsb | Not Applicable |
https://twitter.com/fs0c131y/status/1115889065285562368 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://drfone.wondershare.com/unlock/samsung-galaxy-secret-code-list.html - Third Party Advisory | |
References | () https://security.samsungmobile.com/securityUpdate.smsb - Not Applicable | |
References | () https://twitter.com/fs0c131y/status/1115889065285562368 - Exploit, Third Party Advisory |
Information
Published : 2019-10-09 16:15
Updated : 2024-11-21 04:20
NVD link : CVE-2019-11341
Mitre link : CVE-2019-11341
CVE.ORG link : CVE-2019-11341
JSON object : View
Products Affected
- android
samsung
- phone
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm