Google has revealed the discovery of 18 critical security flaws in Samsung’s Exynos modems, the components that power a wide range of popular smartphones. This information was shared through the Portal with a confirmation from 9to5Google. The exposed vulnerabilities include several that are deemed dangerous because they enable hackers to run arbitrary code on a victim’s device from a distance. In practical terms, an attacker could seize control of a phone by simply knowing the device’s phone number, without the owner taking any action. Google notes that these issues have been resolved in specific modem versions, including Exynos Modem 5123, Exynos Modem 5300, Exynos 980, Exynos 1080, and Exynos Auto T5123. This patching is essential to stop remote exploit scenarios that have the potential to compromise personal data, messages, and app integrity. The situation underscores how pervasive modem-level vulnerabilities can be and why timely updates matter for safeguarding privacy and device functionality.
The affected devices span a wide array of Samsung Galaxy models and other brands that rely on Exynos chipsets. Among the Samsung devices listed are the S22, M33, M13, M12, A71, A53, A33, A21, A13, A12, and A04 series. Additionally, Samsung’s Galaxy S16 and S15 lines, the S6, X70, X60, and X30 variants are included in the exposure map. On the Android side, popular Google Pixel models such as Pixel 6 and 6 Pro, Pixel 6a, Pixel 7, and Pixel 7 Pro were also mentioned as potentially affected in some circumstances. The breadth of devices highlights how common Exynos-based modems are across mainstream smartphones and the importance of firmware-level protections that accompany every major update, not just user-space software patches.
Until manufacturers release and distribute the security patches to all affected devices, Google has advised users to temporarily disable Wi-Fi calling and Voice over LTE. This precautionary measure aims to reduce the risk of exploitation by malicious actors who could leverage the vulnerability to intercept calls or execute dangerous commands remotely. While disabling these features can affect convenience and certain communication workflows, it is a prudent step for those who own devices listed in the advisory and want to minimize exposure while patches continue to rollout through official channels. Consumers should monitor official notices from device makers and carriers, ensuring they apply firmware updates as soon as they become available. Proactive checks for system updates can make a meaningful difference in preserving device integrity and user privacy during this period of heightened vulnerability management.
Historically, these kinds of modem-level flaws remind users that the security of a mobile phone goes beyond app protections or operating system hardening. It requires a layered approach that includes safer network practices, timely firmware updates, and an awareness of how critical hardware components interact with software. It is also a reminder that the security landscape is dynamic, with new threats emerging as technology evolves. For those who want to stay informed, reputable technology outlets and platform advisories provide ongoing coverage about which devices are patched and what steps users should take next. This ongoing vigilance helps communities avoid common scams and reduces the likelihood that sensitive information falls into the wrong hands. The broader takeaway is clear: maintain up-to-date firmware, reconsider risky network configurations, and follow official guidance when a known vulnerability is disclosed.