Skip to content

Instantly share code, notes, and snippets.

@e96e02
Last active August 7, 2018 01:33
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save e96e02/12ce905e3b724954273dd7d543a968f1 to your computer and use it in GitHub Desktop.
Save e96e02/12ce905e3b724954273dd7d543a968f1 to your computer and use it in GitHub Desktop.
Samsung Knox SDS IAM & EMM 16.11 Vulnerability
In Samsung Knox SDS IAM & EMM 16.11 on Samsung mobile devices, a man-in-the-middle attacker can install
any application into the user's Knox container (without the user's knowledge), by inspecting network
traffic coming from a Samsung server and injecting specifically crafted content at a certain point in an update sequence.
This installed application can further leak information stored inside the Knox container to
the outside world.
The research discovered a specific exploitation method. Issue has already been confirmed
and patched by Samsung. The vulnerability was discovered by cyber security researcher Samuel Siino.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment