Get Updates via Email


From the lock screen, hit the emergency call button.
Dial a non-existent emergency services number - e.g. 0.
Press the green dial icon.
Dismiss the error message.
Press the phone's back button.
The app's screen will be briefly displayed.
This is just about long enough to interact with the app.
Using this, you can run and interact with any app / widget / settings menu.
You can also use this to launch the dialler.
From there, you can dial any phone number (one digit at a time) and place a phone call.
With Google Play, you can search for apps using the voice interface.


This does not occur on stock Android from Google. This flaw only seems to be present on Samsung's version of Android. I have only tested it on a Galaxy Note II running 4.1.2 - I believe it should work on Samsung Galaxy SIII. It may work on other devices from Samsung.
My test phone was running 4.1.2 with the Touchwiz launcher from Samsung.
Defending Against This Attack

Until Samsung release a patch, the only way this can be defended against is by completely removing the Samsung firmware and replacing it with a 3rd party ROM.
This ROM for the Galaxy S III claims to have fixed the problem.
I'm sure there will be ROMs for other Galaxy devices in due course.
Responsible Disclosure

I reported this flaw to Samsung in late February. They are working on a patch which they assure me will be released shortly.
I have delayed public disclosure of this vulnerability. I also asked if they wanted me to delay publication until a patch was ready - however they declined this offer.
If you discover a security issue with Samsung's mobile products, I strongly encourage you to email AT
They will provide their PGP public key if you wish to ensure your communications with them are secure.


Anonymous said...

At this time it seems like Movable Type is the best blogging platform out there right now.
(from what I've read) Is that what you are using on your blog?

My web blog: formation et certification CEH