Tuesday, September 25, 2012

Security & Hacking: Samsung Touchwiz Vulnerability

Update: Wed 9/26/2012 Quick fix app from Google Play Store, reviews look positive, but I don't have phone to test this myself currently, https://play.google.com/store/apps/details?id=org.mulliner.telstop

****

Update:  sounds like there are patches out there according to this tweet https://twitter.com/TeamAndIRC/status/250603353665593344
"last week's AT&T SGSIII update fixed this issue, the international one has been fixed for some time."
~ @TeamAndIRC

****
Saw this article on The Verge http://www.theverge.com/2012/9/25/3403928/samsung-touchwiz-reset-vulnerability

Talks about Demo Dirty use of USSD Codes:




 Via Tweet https://twitter.com/pof/status/250540790491787264:
the USSD code to factory data reset a Galaxy S3 is *2767*3855# can be triggered from browser like this: <frame src="tel:*2767*3855%23" />

From what I understand the problem is Touchwiz, not the underlying or base Android :/

No comments:

Post a Comment