Computer Emergency Response Team of India (CERT-In) has issued a high-risk warning to Samsung Galaxy smartphone customers regarding a number of vulnerabilities affecting Samsung Mobile Android versions 11, 12, 13, and 14. Because of the potential for exploitation, the CERT-In has assigned it a High rating.

This happened as a result of researchers finding several flaws that might be dangerous and provide attackers the ability to get past security measures, access private data, and run arbitrary code on systems they are targeting. Samsung released the December security patch earlier this month.

READ: CERT-In Issues Cyber Security Norms For Govt Entities; All You Need To Know

The risks are severe in that they could enable an attacker to send broadcasts with elevated privileges, cause heap overflows and stack-based buffer overflows, access SIM-based devices, read AR Emoji sandbox data, circumvent Knox Guard locks by altering system time, access arbitrary files, obtain sensitive data, run arbitrary code, and compromise the targeted system.

Which Devices Are Affected:

All the recent Galaxy smartphones running on Android versions 11, 12, 13, and 14 are at risk. This means the Galaxy S23 series, Galaxy Flip 5, and Galaxy Fold 5 among others are prone to severe consequences.

READ: India's Cyber Watchdog CERT-In Begins Probe Into 'Hacking' Attempts Charges; Sends Notice To Apple

How To Protect Your Phone:

As per the security note, the users can avoid breaches by following the below-listed steps.

1. Keep Your Device Up To Date: You must ensure that the latest version of the security patch has been installed on your device. You can check for any new updates by going to Settings and then selecting Software.

2. Avoid Interaction With Unfamiliar Sources: You must not interact with unknown sources or install risky applications if you are holding an affected Galaxy device.

3. Applications: Keep your applications up to date and enable the auto-update feature on the Google Play Store.

4. Do Not Install Apps From Untrusted Sources: Avoid installing applications that are from unknown sources and are not credible, as they can be malicious.

5. Avoid Clicking On Links: Do not click on the links in emails, or messages from unknown senders as it can be a phishing trick to steal your personal information.