Connect with us

Updates

Samsung January 2023 update patches 20 dangerous SVEs as well

Published

on

Telegram update

Today, Samsung released the January 2023 security patch details for Galaxy devices. Alongside the Andorid patches by Google, Samsung patches 20 SVEs through the January 2023 update. This complete security OTA package ensures Galaxy customers’ confidence in security.

Follow Sammy Fans on Google News

The South Korean tech giant disclosed that the “SMR January 2023 Release 1” comes with all patches from Samsung and Google. Since the company already patched some SVEs with previous firmware updates, those may not be included in this latest package.

Join Sammy Fans on Telegram

It’s worth mentioning that the January 2022 patch brings fixes for 52 high levels of CVEs for Android devices. Google has not listed any critical or moderate level of CVE in its Android security bulletin, which is applicable on Samsung devices as well.

Samsung Galaxy Software Update

Samsung January 2023 patches

Below, you can check what SVE items are getting patched with the January 2023 software update on Samsung devices. The details include the given identity (CVE/SVE) of the threat, severity level, affected Android versions, report date, disclosure status and impact prior disclosure.

1. SVE-2022-2537(CVE-2023-21430): An out-of-bound read vulnerability in libSDKRecognitionText.spensdk.samsung.so library

  • Severity: Moderate
  • Affected versions: Q(10), R(11), S(12), T(13)
  • Reported on: October 24, 2022
  • Disclosure status: Privately disclosed
  • An out-of-bound read vulnerability in mapToBuffer function in libSDKRecognitionText.spensdk.samsung.so library prior to SMR Jan-2023 Release 1 allows attacker to cause memory access fault.
  • The patch adds proper boundary check logic to prevent out-of-bound access.

2. SVE-2022-2338(CVE-2023-21429): Implicit intent hijacking vulnerability in ePDG

  • Severity: Moderate
  • Affected versions: Q(10), R(11), S(12), T(13)
  • Reported on: September 20, 2022
  • Disclosure status: Privately disclosed
  • Improper usage of implicit intent in ePDG prior to SMR Jan-2023 Release 1 allows attacker to access SSID.
  • The patch change the implicit intent to explicit intent.

3. SVE-2022-2320(CVE-2023-21428): Improper input validation vulnerability in TelephonyUI

  • Severity: Moderate
  • Affected versions: R(11), S(12), T(13)
  • Reported on: September 19, 2022
  • Disclosure status: Privately disclosed
  • Improper input validation vulnerability in TelephonyUI prior to SMR Jan-2023 Release 1 allows attackers to configure Preferred Call.
  • The patch removes unused code.

4. SVE-2022-2280(CVE-2023-21427): Improper access control vulnerabilities in NfcTile

  • Severity: Moderate
  • Affected versions: R(11), S(12), T(13)
  • Reported on: September 15, 2022
  • Disclosure status: Privately disclosed
  • Improper access control vulnerability in NfcTile prior to SMR Jan-2023 Release 1 allows to attacker to use NFC without user recognition.
  • The patch adds proper permission in NfcTile to prevent unauthorized access.

5. SVE-2022-2278(CVE-2023-21426): Hardcoded encryption key vulnerability in NFC

  • Severity: Moderate
  • Affected versions: Select Q(10) devices
  • Reported on: September 15, 2022
  • Disclosure status: Privately disclosed
  • Hardcoded AES key to encrypt cardemulation PINs in NFC prior to SMR Jan-2023 Release 1 allows attackers to access cardemulation PIN.
  • The patch adds proper usage of random private key api to prevent key exposure.

6. SVE-2022-2261(CVE-2023-21425): Improper access control vulnerability in telecom application

  • Severity: Moderate
  • Affected versions: Q(10), R(11), S(12), T(13)
  • Reported on: September 15, 2022
  • Disclosure status: Privately disclosed
  • Improper access control vulnerability in telecom application prior to SMR Jan-2023 Release 1 allows local attackers to get sensitive information.
  • The patch adds proper access control logic to prevent sensitive information leakage.

7. SVE-2022-2118(CVE-2023-21424): Improper Authorization vulnerability in SemChameleonHelper

  • Severity: Moderate
  • Affected versions: R(11), S(12), T(13)
  • Reported on: September 3, 2022
  • Disclosure status: Privately disclosed
  • Improper handling of insufficient permissions or privileges vulnerability in SemChameleonHelper prior to SMR Jan-2023 Release 1 allows attacker to modify network related values, network code, carrier id and operator brand.
  • The patch restricts privilege of the app that calls SemChameleonHelper in Telephony.

8. SVE-2022-1967(CVE-2023-21423): Improper authorization vulnerability in ChnFileShareKit

  • Severity: Moderate
  • Affected versions: S(12), T(13)
  • Reported on: August 17, 2022
  • Disclosure status: Privately disclosed
  • Improper authorization vulnerability in ChnFileShareKit prior to SMR Jan-2023 Release 1 allows attacker to control BLE advertising without permission using unprotected action.
  • The patch adds proper permission.

9. SVE-2022-1931(CVE-2023-21422): Improper authorization vulnerability in WifiSevice

  • Severity: Moderate
  • Affected versions: R(11), S(12)
  • Reported on: August 14, 2022
  • Disclosure status: Privately disclosed
  • Improper authorization vulnerability in semAddPublicDnsAddr in WifiSevice prior to SMR Jan-2023 Release 1 allows attackers to set custom DNS server without permission via binding WifiService.
  • The patch adds permission check logic when call the service API.

10. SVE-2022-1672(CVE-2023-21421): Improper Handling of Insufficient Permissions or Privileges vulnerability in Knox Service

  • Severity: Moderate
  • Affected versions: Q(10), R(11), S(12), T(13)
  • Reported on: July 14, 2022
  • Disclosure status: Privately disclosed
  • Improper handling of insufficient permissions or privileges vulnerability in KnoxCustomManagerService prior to SMR Jan-2023 Release 1 allows attacker to access device SIM PIN.
  • The patch adds proper signature check in KnoxCustomManagerService to prevent unauthorized access.

11. SVE-2022-1364(CVE-2023-21420): Use of Externally-Controlled Format String vulnerabilities in STST TA

  • Severity: High
  • Affected versions: Q(10), R(11) devices with Teegris
  • Reported on: June 3, 2022
  • Disclosure status: Privately disclosed
  • Use of Externally-Controlled Format String vulnerabilities in STST TA prior to SMR Jan-2023 Release 1 allows arbitrary code execution.
  • The patch restricts the triggering for the print of externally controlled format string code.

12. SVE-2022-0471(CVE-2023-21419): A vulnerability in Secure Folder

  • Severity: Moderate
  • Affected versions: S(12)
  • Reported on: February 28, 2022
  • Disclosure status: Privately disclosed
  • An improper implementation logic in Secure Folder prior to SMR Jan-2023 Release 1 allows the Secure Folder container remain unlocked under certain condition.
  • The patch adds restriction that lock the SecureFolder container when PIP is closed.

James is the lead content creator on Sammy Fans and mostly works on Samsung's firmware section. His first phone was the Galaxy S4 and continues to get new S series devices. Most of the time, James tries to learn about new technologies and gadgets but he also sneaks a bit of free time to nearby rivers and nature.

Samsung

Samsung Galaxy M33, A23 receive April 2024 security update

Published

on

Samsung Galaxy M33 A23 April 2024 update

Samsung is releasing a new update with April 2024 security patch for Galaxy M33 and Galaxy A23 smartphones. The fresh update installs the latest Android security patch to improve system security and stability for a better user experience.

The latest patch fixes over 40 issues to make the smartphone more secure, stable, and reliable. It mainly resolves problems related to Storage Manager Service, Out of bounds write, and more.

April 2024 security update for Samsung Galaxy M33 arrives with One UI build version M336BXXS7DXD1 while the Galaxy A23 smartphone is getting it with PDA version A236BXXU5DXD6.

The update is currently rolling out for these devices in Europe and the company will soon make this update available in all eligible markets. It is an initial rollout so it may take some hours or days to reach models.

You can check the update by navigating to the device’s Settings, then a Software update, and Download and install. If you have received the update, install it now to get enhanced features.

Samsung Galaxy M33 A23 April 2024 update

Stay up-to-date on Samsung Galaxy, One UI & Tech Stuffs by following Sammy Fans on X/Twitter. You can also discover the latest news, polls, reviews, and new features for Samsung & Google Apps, Galaxy Phones, and the One UI/Android operating system.

Do you like this post? Kindly, let us know on X/Twitter: we love hearing your feedback! If you prefer using other social platforms besides X, follow/join us on Google News, Facebook, and Telegram.

Continue Reading

Samsung

Samsung upscales 4G TDD on Galaxy S23 FE, A34, and A35 in Europe

Published

on

Galaxy S23 FE A34 A35 4G Europe

Samsung has rolled out the updated 4G TDD band support firmware for Galaxy S23 FE, Galaxy A35, and Galaxy A34 smartphones in Europe. The fresh update enhances the 4G TDD band support to better network connectively.

According to the changelog, the new firmware for Samsung Galaxy S23 FE, Galaxy A35, and Galaxy A34 smartphones in Europe updates the Regional 4G TDD band support to deliver better network performance across various European countries.

It is important to note that Galaxy models purchased in Germany cannot receive signals in LTE TDD bands in several countries, including Belgium, Denmark, France, Luxemburg, Netherlands, Austria, Poland, Switzerland, and the Czech Republic.

Moreover, the update also improves the security and stability of the device. It also fixes some issues for error-free services.

Latest Firmware 

  • Galaxy S23 FE – S711BXXU2CXD3
  • Galaxy A35 – A356BXXU1AXBB
  • Galaxy A34 – A346BXXU6BXD2

If you have received the notification of the update then install it now to get a bug-free experience. You can also check the update by visiting the Settings app on your smartphone and opening the Software Update section. Now, click on the Download and Install option.

New Samsung Galaxy S23 firmware updates LTE TDD band support in Europe

Stay up-to-date on Samsung Galaxy, One UI & Tech Stuffs by following Sammy Fans on X/Twitter. You can also discover the latest news, polls, reviews, and new features for Samsung & Google Apps, Galaxy Phones, and the One UI/Android operating system.

Do you like this post? Kindly, let us know on X/Twitter: we love hearing your feedback! If you prefer using other social platforms besides X, follow/join us on Google News, Facebook, and Telegram.

Continue Reading

Samsung

Exynos Samsung Galaxy S21 FE models grab April 2024 update in India

Published

on

Galaxy S21 FE Exynos April 2024 update

After Snapdragon models, Samsung has released an April 2024 security update for Exynos models of the Galaxy S21 FE smartphone in India. Users can identify the latest update through One UI build version G990EXXS8FXD1.

The fresh update improves system security and stability to enhance the overall performance. It protects against security threats by incorporating the latest security patches for Android. Also, it improves some functions to provide a better user experience.

Users of the Exynos Galaxy S21 FE smartphone in India will have to download a 248.39MB package to install the April 2024 security update. The update is based on One UI 6.0 and the company will soon release One UI 6.1 update for this smartphone.

To install the update, users should navigate to the Software Update section found within the device’s Settings. They can select ‘Download and install’ from there to initiate the update process.

Stay up-to-date on Samsung Galaxy, One UI & Tech Stuffs by following Sammy Fans on X/Twitter. You can also discover the latest news, polls, reviews, and new features for Samsung & Google Apps, Galaxy Phones, and the One UI/Android operating system.

Do you like this post? Kindly, let us know on X/Twitter: we love hearing your feedback! If you prefer using other social platforms besides X, follow/join us on Google News, Facebook, and Telegram.

Continue Reading