News
Samsung April 2023 update will address Exynos modem vulnerability
Galaxy devices are unquestionably secure in the Android segment, thanks to Samsung’s commitment to security. And Samsung has now officially commented on the Exynos modem vulnerability debate and confirmed that it will be addressed with the upcoming April 2023 security update.
According to the info, Samsung is aware of the Exynos modem vulnerabilities and their causes on user privacy. Google’s Project Zero team discovered 18 vulnerabilities in the Samsung Exynos modem of which 6 are applicable on Galaxy devices, while the remaining one will be fixed with the April 2023 update.
The company’s in-charge reiterated that “Samsung takes the safety of our customers very seriously.” The company found that 6 Exynos modem vulnerabilities “may potentially impact” select Galaxy devices, however, none of these are leveled “severe/critical.”
Samsung’s March 2023 patch already fixed 5 of those 6 discovered Exynos modem vulnerabilities. Prior to the update rollout, the company recommended users keep devices updated with the latest software to ensure the highest level of protection possible.
Google compiled a list of devices that may be affected by the Exynos modem vulnerability, which includes the Galaxy S22, S22 Plus, S22 Ultra, M33, M13, M12, A71, A53, A33, A21, A13, A12, and A04/A04s. Besides, the Galaxy smartwatches running Wear OS are also on the list.
Per reports, some of the critical Exynos modem vulnerabilities require certain 5G features to be turned on to make an impact on devices. So as a temporary solution, you can turn off Wi-Fi Calling and VoLTE features on your Galaxy device.
April 2023 Patch
Over the past few months, it was noticed that Samsung is delaying the latest patch’s rollout for Galaxy devices. The company first lets Google detail Android security bulletin, then it starts to push the firmware for Galaxies. Still, we believe Samsung’s April patch may go live for affected devices by the first week of next month.
More on Samsung Exynos Modem vulnerability: