Last active
August 7, 2018 01:33
-
-
Save e96e02/12ce905e3b724954273dd7d543a968f1 to your computer and use it in GitHub Desktop.
Samsung Knox SDS IAM & EMM 16.11 Vulnerability
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
In Samsung Knox SDS IAM & EMM 16.11 on Samsung mobile devices, a man-in-the-middle attacker can install | |
any application into the user's Knox container (without the user's knowledge), by inspecting network | |
traffic coming from a Samsung server and injecting specifically crafted content at a certain point in an update sequence. | |
This installed application can further leak information stored inside the Knox container to | |
the outside world. | |
The research discovered a specific exploitation method. Issue has already been confirmed | |
and patched by Samsung. The vulnerability was discovered by cyber security researcher Samuel Siino. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment