Samsung to roll out security patch for keyboard vulnerability
Bug exposing Galaxy smartphones to hackers will be squashed within coming days
Samsung has announced it is getting ready to fix a bug affecting 600 million Galaxy smartphones that can expose the user to a remote code execution attack.
The vulnerability, which was exposed by security firm NowSecure on 17 June, allows a hacker to access the handset as a system user - one of the highest privilege levels - via the pre-installed, third-party Swift SDK word prediction software, either on reboot or when the app updates. The attacker can then snoop on the victim by reading text messages or even activating the camera.
According to NowSecure, the attack vector is open even if the default keyboard is not Swift.
The organisation claims it told Samsung of the vulnerability in November last year, but decided to go public this week after the hardware maker failed to act on the information.
For its part, Samsung has played down the likelihood of an attack.
"This vulnerability, as noted by the researchers, requires a very specific set of conditions for a hacker to exploit the device this way," the company said. Nevertheless, it is rolling out a security patch over the course of the next few days to combat the issue.
"In addition to the security policy update, we will continue to work with related parties such as SwiftKey to address potential risks going forward," Samsung added.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
While waiting for the update to arrive, the company has advised owners of Galaxy S4, S5, S6 and S6 Edge handsets to turn on the pre-installed KNOX security platform, which can mitigate the threat.
Those who own a Galaxy S3, though, or a non-flagship phone do not have this option and, it would seem, may have to wait a longer to receive a patch, which will eventually come in the shape of a firmware update.
Tod Beardsley, engineering manager at security Firm Rapid7, has commended Samsung for acting quickly following the public revelation of the problem, stating: "Given the unlikely nature of the attack, it's good to see that Samsung is taking this exposure seriously."
"I imagine a proper operating system patch will be released in the coming weeks and months for everyone ... [and] in the meantime users should be aware of the networks they habitually connect to, routinely remove 'remembered' networks they don't often use, and ensure that they reeboot their Samsung devices only while associated to netoworks they normally trust," he added.

Jane McCallion is Managing Editor of ITPro and ChannelPro, specializing in data centers, enterprise IT infrastructure, and cybersecurity. Before becoming Managing Editor, she held the role of Deputy Editor and, prior to that, Features Editor, managing a pool of freelance and internal writers, while continuing to specialize in enterprise IT infrastructure, and business strategy.
Prior to joining ITPro, Jane was a freelance business journalist writing as both Jane McCallion and Jane Bordenave for titles such as European CEO, World Finance, and Business Excellence Magazine.
-
The open source ecosystem is booming thanks to AI, but hackers are taking advantageNews Analysis by Sonatype found that AI is giving attackers new opportunities to target victims
-
Westcon-Comstor enters Balkan market with REAL Security acquisitionNews The acquisition gives the distribution giant immediate access to an established partner ecosystem spanning eight Balkan markets
-
Experts welcome EU-led alternative to MITRE's vulnerability tracking schemeNews The EU-led framework will reduce reliance on US-based MITRE vulnerability reporting database
-
Veeam patches Backup & Replication vulnerabilities, urges users to updateNews The vulnerabilities affect Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds – but not previous versions.
-
Two Fortinet vulnerabilities are being exploited in the wild – patch nowNews Arctic Wolf and Rapid7 said security teams should act immediately to mitigate the Fortinet vulnerabilities
-
Everything you need to know about Google and Apple’s emergency zero-day patchesNews A serious zero-day bug was spotted in Chrome systems that impacts Apple users too, forcing both companies to issue emergency patches
-
Protecting your business with mobile device securityIT leaders face multiple challenges in today’s landscape – secure, frictionless mobile device security helps solve them
-
Security experts claim the CVE Program isn’t up to scratch anymore — inaccurate scores and lengthy delays mean the system needs updatedNews CVE data is vital in combating emerging threats, yet inaccurate ratings and lengthy wait times are placing enterprises at risk
-
IBM AIX users urged to patch immediately as researchers sound alarm on critical flawsNews Network administrators should patch the four IBM AIX flaws as soon as possible
-
Critical Dell Storage Manager flaws could let hackers access sensitive data – patch nowNews A trio of flaws in Dell Storage Manager has prompted a customer alert