Vulnerability & Exploit Database

Back to search

Samsung Galaxy KNOX Android Browser RCE

A vulnerability exists in the KNOX security component of the Samsung Galaxy firmware that allows a remote webpage to install an APK with arbitrary permissions by abusing the 'smdm://' protocol handler registered by the KNOX component. The vulnerability has been confirmed in the Samsung Galaxy S4, S5, Note 3, and Ace 4.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

exploit/android/browser/samsung_knox_smdm_url

Authors

  • Andre Moulu
  • jduck <jduck [at] metasploit.com>
  • joev <joev [at] metasploit.com>

References

Targets

  • Automatic

Platforms

  • android

Architectures

  • dalvik

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/android/browser/samsung_knox_smdm_url msf exploit(samsung_knox_smdm_url) > show targets ...targets... msf exploit(samsung_knox_smdm_url) > set TARGET <target-id> msf exploit(samsung_knox_smdm_url) > show options ...show and set options... msf exploit(samsung_knox_smdm_url) > exploit