{"id":3913,"date":"2014-11-03T19:29:56","date_gmt":"2014-11-03T22:29:56","guid":{"rendered":"https:\/\/www.kwell.net\/kwell_blog\/?p=3913"},"modified":"2014-11-03T19:29:56","modified_gmt":"2014-11-03T22:29:56","slug":"vulnerabilidad-de-samsung","status":"publish","type":"post","link":"https:\/\/www.kwell.net\/kwell_blog\/?p=3913","title":{"rendered":"Vulnerabilidad de Samsung"},"content":{"rendered":"<p>The National Institute of Standards and Technology (NIST) is <a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-8346\" target=\"_blank\" rel=\"nofollow\"><strong><span style=\"color: #3d5a99;\">warning<\/span><\/strong><\/a> users of a newly discovered Zero-Day flaw in the <b><i>Samsung <span style=\"text-decoration: underline;\">Find My Mobile<\/span> service<\/i><\/b>, which fails to validate the sender of a lock-code data received over a network.<\/p>\n<div>The Find My Mobile feature implemented by Samsung in their devices is a mobile web-service that provides samsung users a bunch of features to locate their lost device, to play an alert on a remote device and to lock remotely the mobile phone so that no one else can get the access to the lost device.<\/div>\n<div><\/div>\n<div>The vulnerability in Samsung\u2019s Find My Mobile feature was discovered by <i>Mohamed Abdelbaset Elnoby (@SymbianSyMoh)<\/i>, an Information Security Evangelist from Egypt. The flaw is a Cross-Site Request Forgery (CSRF) that could allow an attacker to remotely lock or unlock the device and even make the device rings too.<\/div>\n<p><!--more--><\/p>\n<div><a href=\"https:\/\/i0.wp.com\/www.kwell.net\/kwell_blog\/wp-content\/uploads\/2014\/11\/Samsung-FindmyMobile.png\"><img data-attachment-id=\"3914\" data-permalink=\"https:\/\/www.kwell.net\/kwell_blog\/?attachment_id=3914\" data-orig-file=\"https:\/\/i0.wp.com\/www.kwell.net\/kwell_blog\/wp-content\/uploads\/2014\/11\/Samsung-FindmyMobile.png?fit=728%2C421&amp;ssl=1\" data-orig-size=\"728,421\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Samsung-FindmyMobile\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/www.kwell.net\/kwell_blog\/wp-content\/uploads\/2014\/11\/Samsung-FindmyMobile.png?fit=300%2C173&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/www.kwell.net\/kwell_blog\/wp-content\/uploads\/2014\/11\/Samsung-FindmyMobile.png?fit=590%2C341&amp;ssl=1\" decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-3914\" src=\"https:\/\/i0.wp.com\/www.kwell.net\/kwell_blog\/wp-content\/uploads\/2014\/11\/Samsung-FindmyMobile.png?resize=590%2C341\" alt=\"Samsung-FindmyMobile\" width=\"590\" height=\"341\" srcset=\"https:\/\/i0.wp.com\/www.kwell.net\/kwell_blog\/wp-content\/uploads\/2014\/11\/Samsung-FindmyMobile.png?w=728&amp;ssl=1 728w, https:\/\/i0.wp.com\/www.kwell.net\/kwell_blog\/wp-content\/uploads\/2014\/11\/Samsung-FindmyMobile.png?resize=300%2C173&amp;ssl=1 300w\" sizes=\"(max-width: 590px) 100vw, 590px\" data-recalc-dims=\"1\" \/><\/a><\/div>\n<div>\u00a0Cross-Site Request Forgery (CSRF or XSRF) is an attack that tricks the victim into loading a page that contains a specially crafted HTML exploit page. Basically, an attacker will use CSRF attack to trick a victim into clicking a URL link that contains malicious or unauthorized requests.<\/div>\n<div>\n<div><\/div>\n<div>The malicious link have the same privileges as the authorized user to perform an undesired task on the behalf of the victim, like change the victim&#8217;s e-mail address, home address, or password, or purchase something. CSRF attack generally targets functions that cause a state change on the server but it can also be used to access victim\u2019s sensitive data.<\/div>\n<blockquote class=\"tr_bq\"><p><i>&#8220;In this way, the attacker can make the victim perform actions that they didn&#8217;t intend to, such as logout, purchase item, change account information, retrieve account information, or any other function provided by the vulnerable website<\/i>,&#8221; Elnoby said.<\/p><\/blockquote>\n<div>The researcher has also provided a proof-of-concept (POC) video that will give you a detail explanation on How the researcher made the attack work on Samsung\u2019s Find My Mobile feature.<\/div>\n<p><iframe loading=\"lazy\" src=\"\/\/www.youtube.com\/embed\/Q3adkpOEjyI\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<div>According to the researcher, the first attack to remotely lock victim\u2019s device is critical if exploited because the attackers are able to lock victim\u2019s device with a lock code of their own choice, forcing the victim to do a recovery for the lock code with his Google Account.<\/div>\n<div>\n<div><\/div>\n<div>The US-CERT\/NIST identified the vulnerability in the Samsung Find My Mobile as <b>CVE-2014-8346 <\/b>and rated the severity of the flaw as HIGH, whereas the exploitability score of the flaw is 10.0.<\/div>\n<div>\n<blockquote class=\"tr_bq\"><p>&#8220;<i>The Remote Controls feature on Samsung mobile devices does not validate the source of lock-code data received over a network, which makes it easier for remote attackers to cause a denial of service (screen locking with an arbitrary code) by triggering unexpected Find My Mobile network traffic<\/i>,&#8221; the security advisory issued by the NIST states.<\/p><\/blockquote>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Comparte esto:<\/h3><div class=\"sd-content\"><ul><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-3913\" class=\"share-facebook sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3913&amp;share=facebook\" target=\"_blank\" title=\"Haz clic para compartir en Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-3913\" class=\"share-twitter sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3913&amp;share=twitter\" target=\"_blank\" title=\"Haz clic para compartir en Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BEntrada%20compartida%5D%20Vulnerabilidad%20de%20Samsung&body=https%3A%2F%2Fwww.kwell.net%2Fkwell_blog%2F%3Fp%3D3913&share=email\" target=\"_blank\" title=\"Haz clic para enviar un enlace por correo electr\u00f3nico a un amigo\" data-email-share-error-title=\"\u00bfTienes un correo electr\u00f3nico configurado?\" data-email-share-error-text=\"Si tienes problemas al compartir por correo electr\u00f3nico, es posible que sea porque no tengas un correo electr\u00f3nico configurado en tu navegador. Puede que tengas que crear un nuevo correo electr\u00f3nico t\u00fa mismo.\" data-email-share-nonce=\"5281c55841\" data-email-share-track-url=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3913&amp;share=email\"><span>Correo electr\u00f3nico<\/span><\/a><\/li><li class=\"share-jetpack-whatsapp\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-jetpack-whatsapp sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3913&amp;share=jetpack-whatsapp\" target=\"_blank\" title=\"Haz clic para compartir en WhatsApp\" ><span>WhatsApp<\/span><\/a><\/li><li class=\"share-skype\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-skype-3913\" class=\"share-skype sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3913&amp;share=skype\" target=\"_blank\" title=\"Haz clic para compartir en Skype\" ><span>Skype<\/span><\/a><\/li><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3913\" target=\"_blank\" title=\"Haz clic para imprimir\" ><span>Imprimir<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-3913\" class=\"share-linkedin sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3913&amp;share=linkedin\" target=\"_blank\" title=\"Haz clic para compartir en LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>The National Institute of Standards and Technology (NIST) is warning users of a newly discovered Zero-Day flaw in the Samsung Find My Mobile service, which fails to validate the sender of a lock-code data received over a network. The Find My Mobile feature implemented by Samsung in their devices is a mobile web-service that provides &hellip;<br \/><a href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3913\">Read more <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Comparte esto:<\/h3><div class=\"sd-content\"><ul><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-3913\" class=\"share-facebook sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3913&amp;share=facebook\" target=\"_blank\" title=\"Haz clic para compartir en Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-3913\" class=\"share-twitter sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3913&amp;share=twitter\" target=\"_blank\" title=\"Haz clic para compartir en Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BEntrada%20compartida%5D%20Vulnerabilidad%20de%20Samsung&body=https%3A%2F%2Fwww.kwell.net%2Fkwell_blog%2F%3Fp%3D3913&share=email\" target=\"_blank\" title=\"Haz clic para enviar un enlace por correo electr\u00f3nico a un amigo\" data-email-share-error-title=\"\u00bfTienes un correo electr\u00f3nico configurado?\" data-email-share-error-text=\"Si tienes problemas al compartir por correo electr\u00f3nico, es posible que sea porque no tengas un correo electr\u00f3nico configurado en tu navegador. Puede que tengas que crear un nuevo correo electr\u00f3nico t\u00fa mismo.\" data-email-share-nonce=\"5281c55841\" data-email-share-track-url=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3913&amp;share=email\"><span>Correo electr\u00f3nico<\/span><\/a><\/li><li class=\"share-jetpack-whatsapp\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-jetpack-whatsapp sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3913&amp;share=jetpack-whatsapp\" target=\"_blank\" title=\"Haz clic para compartir en WhatsApp\" ><span>WhatsApp<\/span><\/a><\/li><li class=\"share-skype\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-skype-3913\" class=\"share-skype sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3913&amp;share=skype\" target=\"_blank\" title=\"Haz clic para compartir en Skype\" ><span>Skype<\/span><\/a><\/li><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3913\" target=\"_blank\" title=\"Haz clic para imprimir\" ><span>Imprimir<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-3913\" class=\"share-linkedin sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=3913&amp;share=linkedin\" target=\"_blank\" title=\"Haz clic para compartir en LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[87,80],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=\/wp\/v2\/posts\/3913"}],"collection":[{"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3913"}],"version-history":[{"count":4,"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=\/wp\/v2\/posts\/3913\/revisions"}],"predecessor-version":[{"id":3918,"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=\/wp\/v2\/posts\/3913\/revisions\/3918"}],"wp:attachment":[{"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}