It seems that a major security loophole has been found on devices that run on the Exynos 4 System On A Chip and Samsung Kernel sources, and the brains behind this vulnerability expose was uncovered by a member over at XDA Developers, who calls himself by the handle “alephzain”. This particular security flaw will concern the kernel that enables the device to read/write by all users, apps and provides access to the entire physical memory. In plain English, all devices that run on the Exynos 4 processor would have been pre-rooted directly from the manufacturers, and this translates to virtually any application that has been downloaded from the Google Play Store or installed manually is able to take full control of the device – while delivering permanent damage, even if you have not rooted your device.

XDA Developers’ Elite Recognized Developer Supercurio is said to be feverishly working on an app that can patch up this security hole, and hopefully along the way, stop apps from taking over the device. We should be able to see Supercurio’s efforts appear on the Google Play Store soon. The Exynos 4210 powered devices include the Samsung Galaxy Note GT-N7000, the Samsung Galaxy S2 GT-I9100, the AT&T Samsung Galaxy S2 GT-I777, while Exynos 4412 devices are the Samsung Galaxy S3 GT-I9300, LTE Samsung Galaxy S3 GT-I9305, Samsung Galaxy Note 2 GT-N7100, LTE Samsung Galaxy Note 2 GT-N7105, Samsung Galaxy Note 10.1 GT-N8000, Samsung Galaxy Note 10.1 GT-N8010 and the Meizu MX

Filed in Cellphones. Read more about and .

Discover more from Ubergizmo

Subscribe now to keep reading and get access to the full archive.

Continue reading