Google confirms Android attacks; no fix for most Samsung users
Posted by mohi-kalantari 1 day ago
Comments
Comment by ptx 1 day ago
Comment by riedel 1 day ago
Comment by homebrewer 1 day ago
Comment by chii 1 day ago
Comment by ycombinatrix 1 day ago
Comment by riedel 1 day ago
Comment by yaro330 1 day ago
Comment by subscribed 19 hours ago
Very old, unpatched and rooted devices can fairly easily pass device integrity check.
It primarily assures the software vendor that the phone is running Google buttplug in the privileged mode.
Remember, handsets running on ANCIENT versions of Android with no patches for years. Whilst seems to be important to raise under the Forbes article (rightly) fussing about a couple of zero-days.
"Custom roms" (whatever that means) can easily spoof the checks in the specific situation (mainly hardware that allows for several things).
Comment by riedel 18 hours ago
Comment by JohnTHaller 1 day ago
Comment by defanor 1 day ago
Comment by JohnTHaller 1 day ago
Fun fact: Pixel 7 and Pixel 7 Pro didn't get a November update
Comment by cmurf 1 day ago
Says September is the latest system update. Click check updates, says it's up to date, click check updates again, says it's preparing system update and hangs out for a while - then says it's downloading and installing a 781M update.
WTF?
Update: OK finally the update completes an hour later, even the reboot took longer than usual - says it's "updated to December 5, 2025"
This phone running Android 16 for a bit over a month now.
Comment by BoppreH 1 day ago
Comment by gucci-on-fleek 1 day ago
Comment by fulafel 1 day ago
Comment by gucci-on-fleek 1 day ago
Comment by th3typh00n 1 day ago
Comment by Grisu_FTP 1 day ago
My fold 6 has the November "security patch level" or what does that refer to?
Comment by j45 1 day ago
Buying a device directly from Samsung may be different, but the manufacturer still has to usually convert the pure android update to their branch.
Still, trying to find a pure android phone is important. More manufacturers used to make them.
Example: https://www.androidauthority.com/best-smartphones-stock-andr...
Comment by crusty 2 hours ago
Comment by vbezhenar 1 day ago
Do these even exist? Last phones I'm aware about were Android One program, but it ended years ago.
The link suggests Google Pixel, but it's not pure android phone, it's full of Google junk software.
Comment by xnx 1 day ago
Comment by bigbadfeline 1 day ago
Being reliant on a single OS permanently nailed to the hardware is no less crazier. I'd like to be able to install another OS on a vulnerable device, it would help tremendously and not only with the security of that specific device.
Now I've got some expensive paperweights that I can't even use as such because every time I see them I have the urge to throw them in the trash can.
Provide a way to unlock the phones and a standard BSP, it should be the law.
Comment by chasil 1 day ago
LineageOS has a build roster of current devices at this URL:
https://lineageos.org/Changelog-30/
The Pixels are the most flexible, but don't buy a model from Verizon (they don't allow unlocked bootloaders).
Most other OEMs require you to generate an unlock token and send it to them, then wait a week, which is extrememly inconvenient (and sometimes they just stop and refuse, as I understand OnePlus has).
If you want a locked bootloader at the end of the process for security, then you will be on a later Pixel with Graphene.
Comment by askvictor 1 day ago
Comment by chasil 1 day ago
I understand that most U.S. banking apps work on Graphene.
As far as contactless payments, try a Pixel watch. I understand that it is entirely separate from the phone.
Comment by tadfisher 1 day ago
Comment by chasil 1 day ago
However, Google Pay will certainly run on my Lineage OnePlus 5. It will not provision localhost, but I am guessing that it will provision a watch.
I would go buy the parts and try it just to know, but I doubt interest would remain here by the time I assembled everything.
Edit: Graphene has a page on this subject, and Garmin appears to be the best option.
https://discuss.grapheneos.org/d/1040-compatibility-with-sma...
Comment by celeryd 1 day ago
Locking OS upgrades to a network vendor is substantially crazier. It creates pockets where the hardware vendor ships a security update but your network doesn't care to ship it and isn't incented to. It is BANANAS.
Comment by edoceo 1 day ago
Comment by secstate 1 day ago
Sorry for the cynical take, but patronizing folks like this is worse than cynicism because it suggests that you actually believe what you're saying is true.
Comment by GuB-42 1 day ago
If you don't know what to do with it because your security standards are so high, just give it to someone with lower standards then you, or use it for some project that doesn't involve sensitive data. And if security is broken to the core, there is probably some vulnerability you can exploit to root your phone and do whatever you want with it, including installing a custom ROM.
Still, I agree with you on making it mandatory to provide an unlock method, at least for out-of-support phones.
Comment by avadodin 1 day ago
Just silently enlisted into a "Residential VPN" and a background script that checks for the SSID "Iranian Research Facility" every time you turn your wifi on for some reason.
Comment by _factor 1 day ago
Comment by GuB-42 1 day ago
Sure, a thief may pick your lock, but unless he knows there is something valuable in there, he will probably go find a car the owner forgot to lock, it less effort and there are plenty of them, or he may look for more valuable targets.
Comment by JohnTHaller 1 day ago
Comment by ChocolateGod 1 day ago
Comment by shwaj 1 day ago
Comment by jcranmer 1 day ago
Comment by Angostura 1 day ago
Comment by eesmith 1 day ago
> The first to be scientifically described, Fuchsia triphylla, was discovered on the Caribbean island of Hispaniola (Haiti and the Dominican Republic) about 1696–1697 by the French Minim friar and botanist, Charles Plumier, during his third expedition to the Greater Antilles. He named the new genus after German botanist Leonhart Fuchs
Comment by crazygringo 1 day ago
It'll still be just as weird. But "chs" is just nonsensical. The idea that it would sound like "sh" is baffling. I mean, I know this is English spelling which is not known for its regularity, but this is just too much.
Comment by pwdisswordfishy 1 day ago
It would probably help if you pronounced it right, with a /ks/.
Comment by umanwizard 1 day ago
Comment by darkwater 1 day ago
TIL and yet another case of "English is fucking weird".
Comment by lloeki 1 day ago
In the word "french" C H is pronounced sh and nobody bats an eye, I don't think it's that outlandish that someone once read it as fuch-sia, incorrectly splitting it compared to the original.
In the language French, fuchsia is unequivocally read something more like few-shia, and I'd bet that even though it comes from German Fuchs-ia (fooks-ia) English has picked it up from the French side.
If you find such a loanword weird, don't you dare try reading Japanese.
https://aethermug.com/posts/the-beautiful-dissociation-of-th...
Comment by soiltype 1 day ago
No, it's not. Unless you think the "n" in french is pronounced "nt".
Comment by lloeki 1 day ago
Scaramouch and crochet though.
Comment by crazygringo 17 hours ago
But the question here is chs, not ch. Which though rare, is widely understood to be a kind of guttural sound or "k" sound followed by an s. In -uchs or -ichs coming from German.
Not the "sh" sound in fuchsia.
Comment by majoe 1 day ago
- Fuchsia is a flower
- which is named after a German botanist (Leonhart Fuchs)
- Fuchsia in English is pronounced completely different than in German.
- Google is surprisingly bad at naming their productsComment by crazygringo 1 day ago
It's not, though.
Comment by surajrmal 19 hours ago
The intention is to have a stable driver abi which should allow you to build an arbitrary OS on top (fuchsia itself is exceptionally modular and doesn't have a lot of opinions it imposes on products built above it). Of course similar to a Linux BSP not helping Fuchsia run, such a layer wouldn't enable you to run other OS on top that are not built on top of fuchsia. There is also a limit to what you can generalize in the OS layers as some products may implement private apis between themselves and specific hardware drivers. A stable ABI also implies that the drivers won't necessarily need to be open source, but if the goal is to keep the rest of the OS updatable even if drivers themselves are not updated, that is a necessary concession. There are also many other practical benefits to keeping drivers open source regardless of license obligations to do so. That all said I'm very optimistic about this direction regardless of these caveats.
Comment by mschuster91 1 day ago
Comment by ifh-hn 1 day ago
Comment by AnthonyMouse 1 day ago
So the only exception is systems with open source drivers. Those are basically supported as long as the hardware architecture is and enthusiasts even have the option of adding support themselves. You can install the latest version of many Linux distributions on the first generation of x86-64 hardware from 2003 and some on 32-bit PC hardware going back to the 1980s.
It should literally be a crime that you can't do the same thing on a five year old phone.
Comment by mschuster91 1 day ago
If you want fast responses to driver bugs, you only have Apple or a fully open-source Linux systems as an option.
Comment by ifh-hn 1 day ago
Comment by mschuster91 18 hours ago
Because in the Windows world, there often are no updates after maybe 1, 2 years. Chances are high, if you look in Device Manager of any reasonably new system, you'll find a lot of drivers dating back to before Covid and that's 5 years ago. Chances are even higher that if you look close enough, you'll find something being exploitable.
With Apple? Their track record for support is around 7 years.
Comment by AnthonyMouse 14 hours ago
If you have macOS, it's supported until the OEM (Apple) stops supporting it. If you have Linux with some proprietary driver, it's supported until the OEM (e.g. Nvidia) stops supporting it. If you have Linux with open source drivers, it keeps working pretty much indefinitely.
Meanwhile 10+ year old hardware is serviceable for many uses. A 15 year old machine from the scrap heap could have 64GB of RAM, a different one could have a low idle power draw for a use where that's the only thing that matters. Put a cheap SSD in a machine of that vintage and someone who is just using web and email could keep using it for the rest of their life.
Comment by RadiozRadioz 1 day ago
Comment by jfindper 1 day ago
https://www.cve.org/CVERecord?id=CVE-2025-48572
https://android.googlesource.com/platform/frameworks/base/+/...
https://android.googlesource.com/platform/frameworks/base/+/...
>"In hasAccountsOnAnyUser of DevicePolicyManagerService.java, there is a possible way to add a Device Owner after provisioning due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed."
https://www.cve.org/CVERecord?id=CVE-2025-48633
https://android.googlesource.com/platform/frameworks/base/+/...
Comment by ActorNightly 1 day ago
https://www.cve.org/CVERecord?id=CVE-2025-48633
Basically, just like most things these days, its all just local privilege escalation. This means that you have to install/run an app that has these exploits built in.
Soif you usage profile doesn't include downloading apps from untrusted sources, you don't need to worry.
Comment by orbital-decay 1 day ago
Comment by lelanthran 14 hours ago
No, its "If you ever need to install some random app from the play, you do need to worry"
I installed the Teams app and Torque Pro today. I am not worried. I've also got the Sherlock games (purchased way back when) that I have yet to install on my new phone.
Installing that app also will not worry me. These apps are trusted because of the authors, not because of the Play store.
Worry is not binary, it's a probability, and you are at high risk if you're installing every rando's app on your phone and low risk if you are not.
Comment by rs186 1 day ago
For sure that's not going to happen to an app released by a major company, but there are lots of less known app created by many different developers.
Comment by ndriscoll 21 hours ago
Comment by skeaker 1 day ago
Comment by aleatorianator 1 day ago
Comment by kelnos 1 day ago
Pixel 8 here, still don't have the update. That's... not great.
Comment by int0x29 1 day ago
Comment by freitasm 1 day ago
Now think that millions of people use the same OS on many different flavours, on different hardware, on multiple operators.
What an inneficient way of doing things.
Comment by rs186 1 day ago
Does it happen with iPhones?
Comment by snailmailman 1 day ago
It’s gotten slightly more confusing with the major updates now being optional. You get a choice between getting a feature update or just security patches. Unless I missed it, my phone never really asked me to update to the latest iOS 26. But I can, it’s there. I’m instead on the latest version of iOS 18. (They changed number schemes. 18 is last years major update)
Apple also does security updates for quite a long time. iOS 15, from 2021, got a security patch in September of this year, and works on the iPhone 6s from 2015.
Comment by SamaraMichi 1 day ago
Comment by surajrmal 19 hours ago
Comment by josephcsible 1 day ago
Comment by nervysnail 1 day ago
Comment by fluidcruft 1 day ago
Comment by throawayonthe 1 day ago
https://grapheneos.org/releases#2025120400
https://github.com/GrapheneOS/platform_manifest/releases/tag...
https://grapheneos.social/@GrapheneOS/115666650605430196
not sure how soon it made it to a majority of devices, but i do have it rn
EDIT: I was wrong, it's actually first mentioned in https://grapheneos.org/releases#2025102200
oct 22? https://github.com/GrapheneOS/platform_manifest/releases/tag...
Comment by AlgebraFox 1 day ago
Comment by Cantinflas 1 day ago
Comment by subscribed 19 hours ago
GoS has already deployed patches to some of the vulnerabilities you'll read about in January.
All the partnering vendors have access to the same bulletins.
Multi-billion companies like Samsung or Google had access to that since AT LEAST October. They chose to release these patches late. Some will release these patches months form now. Some, perhaps never.
So, the tiny team wins.
Comment by aussieguy1234 1 day ago
Comment by 2OEH8eoCRo0 1 day ago
Comment by jeffbee 1 day ago
Comment by Terr_ 1 day ago
Comment by mrgoldenbrown 1 day ago
Comment by jeffbee 1 day ago
Comment by Fishkins 1 day ago
Comment by voxic11 19 hours ago
Comment by fluidcruft 1 day ago
Comment by baal80spam 1 day ago
Comment by pajko 1 day ago
Comment by QuadmasterXLII 1 day ago
Comment by ajross 1 day ago
Comment by array_key_first 1 day ago
Comment by ajross 1 day ago
And it seems like it doesn't. If there is a live exploit in the wild (as seems to be contended), then clearly the solution is to blacklist the app (if it exists on the store, which is not attested) and pull it off the store. And that will work regardless of whether or not Samsung got an update out. Nor does it require an "audit" process in the store, the security people get to short circuit that stuff.
Comment by array_key_first 19 hours ago
Comment by bigbadfeline 1 day ago
We don't know. Practically no technical information is released about the bug, for what I care any play store app may exploit this at one time or another and there's no way to know. It's not like everyone and their CFO are shy of exploiting any user data they can get their greedy hands on.
Comment by ActorNightly 1 day ago
Comment by londons_explore 1 day ago
Comment by usrusr 1 day ago
On the desktop JVM, I've seen bytecode that decompiled to a form more readable than the original source I got access to later...
Comment by londons_explore 1 day ago
Comment by ActorNightly 1 day ago
In todays world, web based exploits are pretty rare. The only time you really see this happen is with full proprietary systems like IPhones because the software stack on those is all intertwined between kernel code and user code, and things like sending a text message with some formatted characters can lead to reboots of phones. But even then, to gain a full command line shell or steal secrets is either impossible due to attack surface, or requires the phone to be in a specific state, like fully factory reset.
The only real danger is chains of trust being compromised, as in some attacker manages to insert malitious code into an already trusted app that uses these exploits.
On a side note i get kick out of reading HN comments about exploitation and hacking. I think people firmly believe that with enough time, a hacker can figure out how to basically take over your phone given any exploit, no matter what it is.
Comment by subscribed 19 hours ago
Remember Kevin Mitnick's most successful approach, social engineering :)
Comment by charcircuit 1 day ago
Yes, they can. We are talking about applying provided security patches to source code, and then releasing a new version of their OS. For patches that have existed for months. The time from patch to release should be on the order l of days from receiving the patches to having a validated OS release with the fix being sent to users. It's not the control of Android which makes Google possible to patch their Pixel branch of AOSP faster than Samsung can patch their own. It's that Samsung doesn't care about prompt security fixes so they don't allocate engineers to do the work.
Comment by kwanbix 1 day ago
Comment by shiandow 1 day ago
How many different models of PCs get released? How hard is it to patch any of their OSs?
Comment by reactordev 1 day ago
If you want to go that route, each manufacturer is responsible for their own drivers for windows, linux, and possibly Mac (though if it’s novel enough, they will do it). Then think about the components that make up a PC. Motherboard, CPU, Memory Control, IO, OS, Audio, Video. Each of those needs to release patches. So its orders of magnitude more than any Android OS. It’s just pure laziness on the hardware manufacturers that don’t want to invest in software/support. They want Google to do that.
Comment by crote 1 day ago
It's the other way around with Android. Google does a new core release, and each individual manufacturer is responsible for modifying it for their devices. If you don't bother to upstream your drivers to mainline Linux and use a skin which heavily modifies core Android, backporting those fixes can quickly become a nightmare.
Comment by reactordev 1 day ago
Apple made a product. Google made a software revenue stream. Entirely different things and now the Android makers are crying foul that they too have to do product engineering support. Nah. This is what you get when you rely on out of house innovation. I hope they all close shop. Not because I like Apple, but because they aren’t in the business of making products, only selling you hardware with bolt on software that it vaguely supports. Like buying a raspberry pi that can make phone calls. Google has them all by the balls.
Comment by thevillagechief 1 day ago
Comment by array_key_first 1 day ago
Even just looking past the bugs that almost certainly exist in the firmware, it makes these devices extremely difficult to update. Whereas on desktop, I get kernel patches expeditiously. Many Android devices are still running kernel 5, and of the ones running recent kernels, we're still waiting months for system patches.
If everyone just upstreamed their shit, then we would live in a Utopia.
Comment by reactordev 1 day ago
For the consumer PC market, Microsoft cornered the market early on with IBM and HP with DOS. They then tried to pull the ladder and raise the gates when they went against OS/2 and Amiga. To win the Windows for Networks wars.
The only reason why majority of consumers use windows is because that’s how they want it. You can easily build a PC, no Microsoft Windows anywhere in a 1 km radius, and install Linux or BSD flavor of choice and be 90% there. Companies don’t want you to do that (i.e. Microsoft and Apple) so they preinstall the OS and it updates over the Internet whenever it wants to. Installing whatever it wants to. User choice be damned.
No, Pc’s don’t need Microsoft anymore than Rap needs p.diddy
Comment by AshamedCaptain 1 day ago
(E.g. Samsung still limits Now brief to latest devices even though it is a 99% software feature + 1% cloud with 0 hardware requirements.)
Comment by crote 1 day ago
Comment by TheDong 1 day ago
I bet this CVE's patched quicker on a samsung device running LineageOS than the stock OS.
The real difference is that Google has a more competent software development process and release process than other android OEMs, regardless of how many different devices they have.
Comment by stackskipton 1 day ago
That's core of the issue. Samsung takes Android, customizes per device and then tosses them into the world. So now they don't have 1 OS to update, they have 100s of OSes to update.
Comment by arghwhat 1 day ago
Can be a pain to move the whole suite to a new major (porting all their inhouse apps, getting all the hardware enablement from vendors updated to match, ...), but we're not dealing with a major upgrade here.
A security patch is "just" a matter of taking the last release, applying the diff, build, qa, release. No customization.
Comment by klooney 1 day ago
Comment by mrgoldenbrown 1 day ago
Comment by drtgh 1 day ago
Comment by like_any_other 1 day ago
Comment by jacquesm 1 day ago
Give me just the security updates please.
Comment by BXLE_1-1-BitIs1 17 hours ago
Of course that leaves security in the hands of the browser.
Comment by DANmode 15 hours ago
Comment by rew0rk 1 day ago
Comment by timothyduong 1 day ago
Followed by a partial walk-back from Google in mid Nov 2025: https://android-developers.googleblog.com/2025/11/android-de...
I would say there is a substantial amount of users willing to install off-play Store .APKs. Substantial enough they're also willing to take a 'jump' and accept the risks/errors displayed
Comment by Squeeze2664 1 day ago
Comment by bramhaag 1 day ago
Comment by jackwilsdon 1 day ago
[1]: https://discuss.grapheneos.org/d/27068-grapheneos-security-p...
Comment by VortexLain 18 hours ago
Comment by resist_futility 1 day ago
https://source.android.com/docs/security/bulletin/2025-12-01
Comment by interloxia 1 day ago
https://source.android.com/docs/security/bulletin/pixel/2025...
Comment by londons_explore 1 day ago
Denial of service doesn't sound so bad... Does a reboot of the device solve it?
Comment by yaro330 1 day ago
Comment by domoregood 1 day ago
Comment by knorker 1 day ago
Every single Samsung product I've had to use is actively user hostile. Like a petty kind of hostile.
Comment by magicalhippo 1 day ago
I've also not been terribly impressed by the UX changes Samsung has made recently, lots of questionable decisions there.
What other decent options are out there?
Comment by dJLcnYfsE3 22 hours ago
So no decent options for out-of-box experience.
Comment by morshu9001 1 day ago
Comment by knorker 22 hours ago
But it's not. It's petty and abusive. For example, you can't see (I think it was) heart rate if you have a Samsung smart watch, but don't have a Samsung phone. They've gone out of their way to just not provide that, if you instead have a Pixel phone. And you need like 5 gigantic apps installed to manage it. Why is it not just one single Samsung wear app? Because they are abusive.
Comment by morshu9001 16 hours ago
Personally have no reason to consider anything but an iPhone, even if it has to be used.
Comment by TiredOfLife 1 day ago
Comment by Noaidi 1 day ago
But I mean, why do we only have two choices of OS for phones (I did not include GrapheneOS because it not easily available for the normie)? That is what is ridiculous. And why, in the US, do I only get three choices of flagship phones when in Asia they have like twenty? I hate this third world country I am living in.
Comment by yaro330 1 day ago
Comment by kaluga 1 day ago
Comment by purplehat_ 1 day ago
Comment by charcircuit 1 day ago
Comment by pogue 1 day ago
Comment by gpm 1 day ago
In particular they're usually f-droid and open source apps compiled by f-droid.
Comment by barrkel 1 day ago
It has to do with setting the device owner, and gaining those powers; enabling / disabling apps, remote wipe, etc.. It's a local privilege escalation attack and doesn't require user interaction.
Comment by 4ndrewl 1 day ago
Comment by weberer 1 day ago
Comment by nutjob2 1 day ago
True, it says almost nothing of value about the exploit, but it does teach us that 30% is almost one in three.
Comment by da_grift_shift 1 day ago
This is just polluting the namespace and making it harder for blue teamers and incident responders to share IOCs.
His repos either lack a PoC and just contain a README with more emojis than facts; try to pass a public version checker off as a PoC; or invent a non-working PoC in the absence of technical details.
Bullshit asymmetry.
Comment by baaron 1 day ago