According to Android Authority , the first group exploited a vulnerability in the allowed input list on the Galaxy S23, while the second group may have exploited the phone's input validation technique. Simply put, improper input validation can allow hackers to phish applications and execute code or control resources on the device.
A vulnerability in the Galaxy S23 was exploited by a group of hackers who claimed a $50,000 reward.
According to the contest rules, participants must "interact with the device by browsing web content in the default browser for the target being tested," or by communicating with the device via NFC, Wi-Fi, or Bluetooth. The device must also be running the latest software version and patches.
While this news may be alarming for Galaxy S23 owners, the contest provides a safe space and rewards for security researchers to discover and exploit vulnerabilities in popular devices. From there, companies can understand and find ways to improve the security of their devices.
The Galaxy S23 was one of four phones available to researchers participating in the competition, alongside the Google Pixel 7, iPhone 14, and Xiaomi 13 Pro. In addition, several other devices, including smart home devices, network storage devices, and printers, were also exploited on the first day of this year's competition.
Notably, at last year's Pwn2Own competition, the Galaxy S22 running Android 13 was also hacked in just 55 seconds. During the four days of the competition, the Galaxy S22's security measures were exploited four times. This year's Pwn2Own competition runs until October 27th, so more vulnerabilities on popular devices may also be revealed.
Source link






Comment (0)