Serious vulnerabilities discovered in Google, Samsung and Vivo devices (CVE-2023-24033)

Sicherheitslücken-bei-Google-und-Samsung

Security researchers have discovered several serious security vulnerabilities on Google, Samsung and Vivo devices, which are supposed to make it possible for criminals to install malware on the devices and even gain full control over them (CVE-2023-24033). Until now, the vulnerabilities can only be closed by updates on some devices.

We strongly recommend you to install available updates and make changes in settings on other devices. Hereby, we are providing you with important information.

What happened and what are the consequences?

Vulnerabilities have been discovered in the Samsung Exynos modem, which, according to security experts, can be exploited by simply knowing the cell phone number. Criminals are said to be able to install malware on a device and even gain full control over the devices.

Google has already released an update for some devices. Updates are still pending for other Google devices as well as Samsung and Vivo devices. According to the experts, changes in the settings can prevent the vulnerabilities from being exploited on these devices as well.

Who is affected?

Google, Samsung and Vivo devices with certain Samsung Exynos modems are said to be affected. The affected chips are installed in the following devices, among others:

  • Google Pixel 6 and Pixel 7
  • Samsung S22, M33, M13, M12, A71, A53, A33, A21s, A13, A12 and A04
  • Vivo S16, S15, S6, X70, X60 and X30
  • Devices with Exynos W920
  • Devices with Exynos Auto T5123

What should you do?

We strongly recommend,

  • to request employees with Google smartphones, for which an update is already available, to install the update offered by Google. The March security patch fixes the vulnerability. You can initiate the update via your UEM system to ensure timely closure of the vulnerability.
  • to request employees with Google devices that do not yet have an update, as well as with Samsung and Vivo devices, to deactivate WiFi calls and VoLTE in the device settings. This will prevent the vulnerability from being exploited.
onboarder_kontakt

Please feel free to contact us if we can support you – for example with the automatic provision of updates.

And if you have any further questions, please do not hesitate to contact us (moc.f1765027328be@tr1765027328oppus1765027328).

Find out about the latest developments in the fast-moving digital workplace!

We keep you regularly informed about exciting topics around the digital workplace and invite you to our webinars.
captcha
Enter the characters shown in the image:
Reload

This CAPTCHA helps ensure that you are human. Please enter the requested characters.

EBF-Mobility-Newsletter

This might also be of interest to you

Traditional security approaches are reaching their limits. Together with Armis, EBF offers a modern solution for full transparency, intelligent risk analysis, and protection of all networked assets.
Changing UEM systems can be challenging, especially when there are thousands of devices and different usage scenarios. In this article, we show how EBF Onboarder helps companies significantly reduce effort and frustration.
Find out what makes the EBF Onboarder so special and how it has simplified UEM migration.
Learn which solution offers greater flexibility, transparency, and user-friendliness when switching UEM.
WWDC 2025 brings many new features for IT administrators and UEM managers: single sign-on directly in the setup assistant, granularly controllable updates with Declarative Device Management, and more control over Apple Business Manager.
Artificial intelligence offers enormous potential for automating processes, reducing the workload of employees, and improving customer experiences in the long term.

WHITEPAPER

EBF safety compass

A comprehensive guide to IT security.

Whitepaper_Sicherheitskompass

Enterprise Mobility Newsletter

We keep you up to date on the topics of Enterprise Mobility and Digital Workplace

EBF-Mobility-Newsletter_EN_xs