Two groups of white hat hackers have managed to break into the Samsung Galaxy S23 flagship smartphone with the latest software and security updates installed, granting them the ability to execute all kinds of code on the device.
The demos happened during the Pwn2Own 2023 hacking contest that’s currently taking place in Toronto, Canada. The first group to successfully break into the Galaxy S23 device was Pentest Limited. By exploiting an improper input validation vulnerability, the group gained code execution ability, as well as a $50,000 reward from the organizers.
The second group to achieve a similar result was STAR Labs SG, which exploited a permissive list of allowed inputs, and earned them a $25,000 reward.
On the second day of the event, security researcher Le Xich Long, as well as researchers from Interrupt labs, will also be probing into the device, BleepingComputer added.
Besides hacking Samsung’s flagships, the event’s participants also found and demonstrated zero-day vulnerabilities in the Xiaomi 13 Pro, various printers, smart speakers, Network Attached Storage (NAS) endpoints, and surveillance cameras, from popular manufacturers such as Western Digital, QNAP, Synology, Canon, Lexmark, and Sonos.
On the first day, the participants demoed 23 zero-day vulnerabilities, earning a total of $438,750 in rewards.
More from TechRadar Pro
- Online scammers target desperate loan seekers using online fraud
- Here's a list of the best firewalls today
- These are the best ID theft protection tools right now
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.