Blog

Serious vulnerabilities discovered in Google, Samsung and Vivo devices (CVE-2023-24033)

Security researchers have discovered several serious security vulnerabilities on Google, Samsung and Vivo devices, which are supposed to make it possible for criminals to install malware on the devices and even gain full control over them.

Security researchers have discovered several serious security vulnerabilities on Google, Samsung and Vivo devices, which are supposed to make it possible for criminals to install malware on the devices and even gain full control over them (CVE-2023-24033). Until now, the vulnerabilities can only be closed by updates on some devices.

We strongly recommend you to install available updates and make changes in settings on other devices. Hereby, we are providing you with important information.

What happened and what are the consequences?

Vulnerabilities have been discovered in the Samsung Exynos modem, which, according to security experts, can be exploited by simply knowing the cell phone number. Criminals are said to be able to install malware on a device and even gain full control over the devices.

Google has already released an update for some devices. Updates are still pending for other Google devices as well as Samsung and Vivo devices. According to the experts, changes in the settings can prevent the vulnerabilities from being exploited on these devices as well.

Who is affected?

Google, Samsung and Vivo devices with certain Samsung Exynos modems are said to be affected. The affected chips are installed in the following devices, among others:

  • Google Pixel 6 and Pixel 7
  • Samsung S22, M33, M13, M12, A71, A53, A33, A21s, A13, A12 and A04
  • Vivo S16, S15, S6, X70, X60 and X30
  • Devices with Exynos W920
  • Devices with Exynos Auto T5123

What should you do?

We strongly recommend,

  • to request employees with Google smartphones, for which an update is already available, to install the update offered by Google. The March security patch fixes the vulnerability. You can initiate the update via your UEM system to ensure timely closure of the vulnerability.
  • to request employees with Google devices that do not yet have an update, as well as with Samsung and Vivo devices, to deactivate WiFi calls and VoLTE in the device settings. This will prevent the vulnerability from being exploited.

Please feel free to contact us if we can support you – for example with the automatic provision of updates.

And if you have any further questions, please do not hesitate to contact us (moc.f1714893538be@tr1714893538oppus1714893538).

Recent Posts

  • Blog

EBF Girls’Day: What a great day!

Read more about our first Girls'Day and learn whether we also succeeded in turning initial… Read More

02/05/2024
  • Blog

Migration now also easy for Windows devices

You will find out why Windows and Mac migration was still a problem in the… Read More

09/04/2024
  • Blog

Exploring Apple Vision Pro: A Glimpse into the Future of Spatial Computing

First impression and possible uses for companies Read More

05/04/2024
  • Blog

Honoured – Telekom Best Mobile Business Enabler 2023

We report on the cooperation with Deutsche Telekom and the many opportunities for our customers. Read More

25/03/2024
  • Blog

March 2024: What’s new? Our solutions for the modern workplace

We present the latest innovations of our EBF products. Read More

06/03/2024
  • Blog

3rd-party app stores: Forced changes pose security risks for companies in the EU starting with iOS 17.4

We explain what is changing in the app stores, what this means for companies and… Read More

19/02/2024
Alle Artikel lesen
Impressum | Datenschutz