CVE-2021-22495
https://notcve.org/view.php?id=CVE-2021-22495
An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), Q(10.0), and R(11.0) (Exynos chipsets) software. The Mali GPU driver allows out-of-bounds access and a device reset. The Samsung ID is SVE-2020-19174 (January 2021). Se detectó un problema en los dispositivos móviles de Samsung con versiones de software O(8.x), P(9.0), Q(10.0) y R(11.0) (chipsets Exynos). El controlador GPU de Mali permite un acceso fuera de límites y el reinicio del dispositivo. • https://security.samsungmobile.com/securityUpdate.smsb • CWE-787: Out-of-bounds Write •
CVE-2020-35693
https://notcve.org/view.php?id=CVE-2020-35693
On some Samsung phones and tablets running Android through 7.1.1, it is possible for an attacker-controlled Bluetooth Low Energy (BLE) device to pair silently with a vulnerable target device, without any user interaction, when the target device's Bluetooth is on, and it is running an app that offers a connectable BLE advertisement. An example of such an app could be a Bluetooth-based contact tracing app, such as Australia's COVIDSafe app, Singapore's TraceTogether app, or France's TousAntiCovid (formerly StopCovid). As part of the pairing process, two pieces (among others) of personally identifiable information are exchanged: the Identity Address of the Bluetooth adapter of the target device, and its associated Identity Resolving Key (IRK). Either one of these identifiers can be used to perform re-identification of the target device for long term tracking. The list of affected devices includes (but is not limited to): Galaxy Note 5, Galaxy S6 Edge, Galaxy A3, Tab A (2017), J2 Pro (2018), Galaxy Note 4, and Galaxy S5. • https://github.com/alwentiu/contact-tracing-research/blob/main/samsung.pdf •
CVE-2020-35549
https://notcve.org/view.php?id=CVE-2020-35549
An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) software. Any application may establish itself as the default dialer, without user interaction. The Samsung ID is SVE-2020-19172 (December 2020). Se detectó un problema en los dispositivos móviles Samsung con versiones de software O(8.x), P(9.0) y Q(10.0). Cualquier aplicación puede establecerse como el marcador predeterminado, sin una interacción del usuario. • https://security.samsungmobile.com/securityUpdate.smsb •
CVE-2020-35550
https://notcve.org/view.php?id=CVE-2020-35550
An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), Q(10.0), and R(11.0) software. Attackers can bypass Factory Reset Protection (FRP) via StatusBar. The Samsung ID is SVE-2020-17888 (December 2020). Se detectó un problema en los dispositivos móviles Samsung con versiones de software O(8.x), P(9.0), Q(10.0) y R(11.0). Unos atacantes pueden omitir Factory Reset Protection (FRP) por medio de StatusBar. • https://security.samsungmobile.com/securityUpdate.smsb •
CVE-2020-35551
https://notcve.org/view.php?id=CVE-2020-35551
An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) (Exynos chipsets) software. They allow attackers to conduct RPMB state-change attacks because an unauthorized RPMB write operation can be replayed, a related issue to CVE-2020-13799. The Samsung ID is SVE-2020-18100 (December 2020). Se detectó un problema en los dispositivos móviles Samsung con versiones software O(8.x), P(9.0) y Q(10.0) (chipsets Exynos). Permiten a atacantes conducir ataques de cambio de estado RPMB porque puede ser reproducida una operación de escritura RPMB no autorizada, un problema relacionado con CVE-2020-13799. • https://security.samsungmobile.com/securityUpdate.smsb • CWE-294: Authentication Bypass by Capture-replay •