Skip to main content

Samsung Galaxy S3 contains same security flaw as Note 2

At the beginning of the week a security bug was uncovered in the Samsung Galaxy Note 2, allowing users to bypass the lock screen and access applications beyond, leaving sensitive data on the device at risk.

We suspected the flaw lay in the Android 4.1.2 OS being run by most Galaxy Note 2s, but with the same problem now being discovered in the Samsung Galaxy S3, the issue appears to lie within Samsung’s own software overlay.

The latest lock screen bypass was first reported on, with Sean McMillan explaining how entering the emergency calls section, pressing the home key, and swiftly pressing the power button brings you straight to the home screen if executed correctly.

The bypass has been successfully tested on a number of S3 devices and mimics the Galaxy Note 2 flaw very closely, where entering the emergency call section and a quick button sequence also broke through the lock screen.

Mobile blogger Terence Eden, who demonstrated the Galaxy Note bug but had no reply from Samsung when he informed them of the problem, says, “Samsung have a really poor record on Android security. Avoid purchasing their phones at all costs.”

The Galaxy S3 discovery is sure to prompt the Korean manufacturer into delivering a fix soon, just as Apple was forced to do after a similar flaw was found on the iOS 6.1 lock screen in February. With anticipation mounting ahead of the Samsung Galaxy S4 launch in a week’s time, the firm will be keen to extinguish any negative publicity concerning its popular handset line.