Samsung Galaxy - Gain Access to Samsung Account
-
Ken Gannon
- Published: 28 Apr 2021
CVE-2021-25374
Share
Type
Severity
Affected products
Remediation
Credits
03/10/2020 | Issue disclosed to Samsung Mobile Security |
03/10/2020 | Issue assigned to a Samsung Security Analyst |
25/10/2020 | Samsung confirms the vulnerability and rates it as a high risk issue |
11/01/2021 | Follow up sent to Samsung |
11/01/2021 | Samsung responded to follow up saying a patch is still being worked on |
06/04/2021 | Patch released, Samsung initiates process for bug bounty reward |
06/04/2021 | CVE Assigned |
28/04/2021 | Advisory Published |
F-Secure looked into exploiting the Samsung S20 device for Tokyo Pwn2Own 2020. An issue was discovered that would have allowed an attacker to gain access to the victim’s Samsung Account.
Samsung Members (com.samsung.android.voc) is an application which offers tips and solutions for Samsung device owners. For US and South Korean users, the app also offers a portal to login to Samsung Members, the official Samsung loyalty program.
A webview within the Samsung Rewards section of the application could be used to obtain access to someone’s Samsung account. The following launchable intent could be used to replicate this issue:
Users that have a vulnerable version of Samsung Members installed are at risk of having their Samsung Account compromised via the above browsable link. After tapping the above link on a vulnerable phone, the application will make a HTTP request similar to the following, which contains the user’s authorization bearer token and appid. In this scenario, an attacker controls the IP address located at "
GET /yay.html HTTP/1.1
Host:
Using these two pieces of information, it is possible for an attacker to make a series of requests that would give the attacker access to the user’s Samsung Account. F-Secure developed a Python Proof of Concept (PoC) script that would automate the series of requests and print the account’s profile information. The screenshot below shows the PoC script in action (left) and what the phone displays during exploitation (right):
The PoC script can be found on F-Secure’s GitHub page at https://github.com/FSecureLABS/CVE-2021-25374_Samsung-Account-Access.