In Knox SDS IAM (Identity Access Management) and EMM (Enterprise Mobility Management) 16.11 on Samsung mobile devices, a man-in-the-middle attacker can install any application into the Knox container (without the user's knowledge) by inspecting network traffic from a Samsung server and injecting content at a certain point in the update sequence. This installed application can further leak information stored inside the Knox container to the outside world.
                
            References
                    | Link | Resource | 
|---|---|
| https://gist.github.com/e96e02/12ce905e3b724954273dd7d543a968f1 | Third Party Advisory | 
| https://www.lgsinnovations.com/lgs-innovations-discovers-samsung-mobile-product-security-vulnerability/ | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2018-02-20 19:29
Updated : 2018-03-18 11:05
NVD link : CVE-2017-10963
Mitre link : CVE-2017-10963
CVE.ORG link : CVE-2017-10963
JSON object : View
Products Affected
                samsung
- knox_identity_access_management
- knox_enterprise_mobility_management
CWE
                
                    
                        
                        CWE-74
                        
            Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
