<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/rss-style.xsl" type="text/xsl"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	    xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	     xmlns:dc="http://purl.org/dc/elements/1.1/"
	   xmlns:atom="http://www.w3.org/2005/Atom"
	     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	  xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>
<channel>
	<title>lockscreen &#8211; Terence Eden’s Blog</title>
	<atom:link href="https://shkspr.mobi/blog/tag/lockscreen/feed/" rel="self" type="application/rss+xml" />
	<link>https://shkspr.mobi/blog</link>
	<description>Regular nonsense about tech and its effects 🙃</description>
	<lastBuildDate>Thu, 20 Mar 2025 09:39:58 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://shkspr.mobi/blog/wp-content/uploads/2023/07/cropped-avatar-32x32.jpeg</url>
	<title>lockscreen &#8211; Terence Eden’s Blog</title>
	<link>https://shkspr.mobi/blog</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title><![CDATA[New! Samsung Security Flaw - Disable Lockscreen - Total Control]]></title>
		<link>https://shkspr.mobi/blog/2013/03/new-bypass-samsung-lockscreen-total-control/</link>
					<comments>https://shkspr.mobi/blog/2013/03/new-bypass-samsung-lockscreen-total-control/#comments</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Wed, 20 Mar 2013 06:00:10 +0000</pubDate>
				<category><![CDATA[mobile]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[lockscreen]]></category>
		<category><![CDATA[samsung]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://shkspr.mobi/blog/?p=7765</guid>

					<description><![CDATA[I have discovered another security flaw in Samsung Android phones.  It is possible to completely disable the lock screen and get access to any app - even when the phone is &#34;securely&#34; locked with a pattern, PIN, password, or face detection.  Unlike another recently released flaw, this doesn&#039;t rely quite so heavily on ultra-precise timing.  Video.    Of course, if you are unable to download a…]]></description>
										<content:encoded><![CDATA[<p>I have discovered <em>another</em> security flaw in Samsung Android phones.  It is possible to completely disable the lock screen and get access to any app - even when the phone is "securely" locked with a pattern, PIN, password, or face detection.  Unlike another recently released flaw, this doesn't rely quite so heavily on ultra-precise timing.</p>

<p><a href="https://www.youtube.com/watch?v=YEsdHs0-W-Y">Video</a>.</p>

<iframe title="Samsung Completely Disable Lockscreen" width="620" height="349" src="https://www.youtube.com/embed/YEsdHs0-W-Y?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen=""></iframe>

<p>Of course, if you are unable to download a screen unlocker, this security vulnerability still allows you to <strong><a href="https://www.youtube.com/watch?v=cj2xzlno8xw">dial any phone number and run any app</a></strong>!</p>

<h2 id="howto"><a href="https://shkspr.mobi/blog/2013/03/new-bypass-samsung-lockscreen-total-control/#howto">HOWTO</a></h2>

<ol>
    <li>From the lock screen, hit the emergency call button.</li>
    <li>Dial a non-existent emergency services number - e.g. 0.</li>
    <li>Press the green dial icon.</li>
    <li>Dismiss the error message.</li>
    <li>Press the phone's back button.</li>
    <li>The app's screen will be briefly displayed.</li>
    <li>This is just about long enough to interact with the app.</li>
    <li>Using this, you can run and interact with any app / widget / settings menu.</li>
    <li>You can also use this to launch the dialler.</li>
    <li>From there, you can dial any phone number (one digit at a time) and place a phone call.</li>
    <li>With Google Play, you can search for apps using the voice interface.</li>
    <li>You can download <a href="https://play.google.com/store/apps/details?id=org.jraf.android.nolock">apps from the app store which will disable the screen lock</a>.</li>
</ol>

<h2 id="impact"><a href="https://shkspr.mobi/blog/2013/03/new-bypass-samsung-lockscreen-total-control/#impact">Impact</a></h2>

<p>This does <em>not</em> occur on stock Android from Google. This flaw only seems to be present on Samsung's version of Android.  I have only tested it on a Galaxy Note II running 4.1.2 - I believe it should work on Samsung Galaxy SIII.  It may work on other devices from Samsung.</p>

<p>My test phone was running 4.1.2 with the Touchwiz launcher from Samsung.</p>

<h2 id="defending-against-this-attack"><a href="https://shkspr.mobi/blog/2013/03/new-bypass-samsung-lockscreen-total-control/#defending-against-this-attack">Defending Against This Attack</a></h2>

<p>Until Samsung release a patch, the only way this can be defended against is by completely removing the Samsung firmware and replacing it with a 3rd party ROM.
<a href="http://forum.xda-developers.com/showthread.php?t=1807819">This ROM for the Galaxy S III</a> claims to have fixed the problem.
I'm sure there will be ROMs for other Galaxy devices in due course.</p>

<h3 id="update-2013-03-20t1654120000"><a href="https://shkspr.mobi/blog/2013/03/new-bypass-samsung-lockscreen-total-control/#update-2013-03-20t1654120000">UPDATE 2013-03-20T16:54:12+00:00</a></h3>

<p>YouTube user "bicecream88" has alerted me to a way to partially defend against this attack.
By disabling your screen animations, it is possible to reduce the amount of time the screen is displayed.
<code>Settings -&gt; Developer Options -&gt; Window animation scale -&gt; off</code>
Repeat for Transition animation scale and Animator duration scale.</p>

<p>The vulnerability is still present - but you need to be a lot quicker in order to exploit it.</p>

<h2 id="responsible-disclosure"><a href="https://shkspr.mobi/blog/2013/03/new-bypass-samsung-lockscreen-total-control/#responsible-disclosure">Responsible Disclosure</a></h2>

<p>I reported this flaw to Samsung in late February. They are working on a patch which they assure me will be released shortly.
I have delayed public disclosure of this vulnerability.  I also asked if they wanted me to delay publication until a patch was ready - however they declined this offer.</p>

<p>If you discover a security issue with Samsung's mobile products, I strongly encourage you to email m.security AT samsung.com</p>

<p>They will provide their PGP public key if you wish to ensure your communications with them are secure.</p>

<h2 id="thanks"><a href="https://shkspr.mobi/blog/2013/03/new-bypass-samsung-lockscreen-total-control/#thanks">Thanks</a></h2>

<p>My thanks to Thang Chien of Vietnam, who first <a href="https://web.archive.org/web/20140710055943/https://www.youtube.com/watch?v=4Q54l6cNj_I">demonstrated a variant of this flaw in January</a>.</p>

<p>Thanks also to <a href="http://blog.mobilephonesecurity.org/">David Rogers</a>, <a href="https://www.linkedin.com/in/marcrogers">Marc Rogers</a>, <a href="http://dropsafe.crypticide.com/">Alec Muffett</a>, and <a href="https://twitter.com/glynwintle">Glyn Wintle</a> for their wisdom and advice around the subject of responsible disclosure.  Any faults with this disclosure are mine and mine alone.</p>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=7765&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2013/03/new-bypass-samsung-lockscreen-total-control/feed/</wfw:commentRss>
			<slash:comments>11</slash:comments>
		
		
			</item>
	</channel>
</rss>
