November 22, 2022

Samsung Devices | CVE-2021-25337/369/370

Coverage and Recommendation for Lookout Admins

Lookout admins should proactively enable the vulnerability protection policy in the Lookout console. Using the out-of-date Android Security Patch Level at March 2021 or higher and risk level for vulnerable applications will help avoid this kill chain. As of November 17th, 2022, Lookout will alert versions prior to 3.0.05.7 of Samsung Text-to-Speech as vulnerable. The coverage can be tracked as Samsung-CVE-2021-25337.gen. In addition, CISA is requiring all government organizations to update these apps by November 29th.

Overview

Google’s Threat Analysis Group (TAG) under Project Zero recently revealed an active kill chain that exploits vulnerabilities in Samsung devices. The affected devices are built with the Exynos SOC chip, which is one of the most common chips used in Samsung devices and run kernel version 4.14.113. These exploits are believed to belong to a commercial surveillance vendor and the three vulnerabilities they take advantage of are detailed below. They can all be patched by the March 2021 Samsung security patch.

Lookout Analysis

Together, the three vulnerabilities form a kill chain. For initial access, the Samsung clipboard runs as the system user and leverages CVE-2021-25337 to grant arbitrary file read and write capabilities. It then provides privileged access at the Android OS level via the system server and reuses the same CVE to execute code via the Samsung Text-to-Speech app. From here, the kill chain utilizes CVE- 2021-25369 for an information leak of the kernel address via sec_log. The third vulnerability, CVE-2021-25370, lies in the display and enhancement controller that creates video signals, and is used to gain arbitrary kernel read and write access using the DPU driver.

The most likely way for an attacker to exploit this vulnerability would be to gain initial access onto the device through a malicious application that can access the clipboard. The following MITRE techniques could be in play: Command and Scripting Interpreter T1623, Abuse Elevation Control Mechanism (T1626), Native API (Execution, T1575), and Software Discovery (T1418). The Samsung Text-to-Speech application can be updated via the Samsung Galaxy store, not the Google Play Store.

Authors

Lookout

Cloud & Endpoint Security

Lookout, Inc. is the data-centric cloud security company that uses a defense-in-depth strategy to address the different stages of a modern cybersecurity attack. Data is at the core of every organization, and our approach to cybersecurity is designed to protect that data within today’s evolving threat landscape no matter where or how it moves.

Entry Type
Threat Guidances
Threat Type
Vulnerability
Platform(s) Affected
Android
Platform(s) Affected
Threat Guidances
Vulnerability
Android

Stop Cyberattacks Before They Start With Industry-Leading Threat Intelligence.

HeaderHeaderHeaderHeader
CellCellCellCell
CellCellCellCell
CellCellCellCell
CellCellCellCell