What’s inside Samsung January 2023 security patch?

What's inside Samsung January 2023 security patch?

We have started running on the track of the new year, and so is Samsung. The company has finally published the freshly released Samsung January 2023 security patch details. While the tech maker has already pushed it off to its mid-rangers, starting with the Galaxy Note 10 devices. No doubt, Samsung will soon bring this improvement package to the flagship models.

Every tech item holds some pros and cons on its surface, and Samsung knows about this fact very well. Thus, to keep its device safe and secure, the company rolls out a maintenance patch every month. Consequently, these patches tie up the voids that can give rise to several harmful threats and exploits in the security system.

Follow RPRNA on Google News

The same goes for the Samsung January 2023 security patch. This useful improvement piece eliminates a variety of issues in the internal framework of the device’s system. Besides, it offers immense stability as well as firmness to the core mechanisms. As a result, users will get a productive and more responsive operating system after installing this patch.

Join Us On Telegram

As per the input revealings, the January 2023 security patch adopts fixes for 52 high-level vulnerabilities of the system. However, this time the department of critical and moderate level remain empty. On the flip side, it also mends a few bugs and improves some specific functions of the devices, mainly related to the telecom subject. You can read the details below.

What's inside Samsung January 2023 security patch?

Samsung January 2023 Security Patch Details:


  • None


  • CVE-2021-39660, CVE-2022-23960(A-215557547), CVE-2022-32619, CVE-2022-32594, CVE-2022-32597, CVE-2022-32598, CVE-2022-32596, CVE-2022-25698, CVE-2022-25697, CVE-2022-25681, CVE-2022-25672, CVE-2022-25685, CVE-2022-25692, CVE-2022-25689, CVE-2022-25673, CVE-2022-25695, CVE-2022-25691, CVE-2022-25702, CVE-2022-25682, CVE-2022-33235, CVE-2022-39106, CVE-2022-39129, CVE-2022-39130, CVE-2022-39131, CVE-2022-39132, CVE-2022-39134, CVE-2022-42756, CVE-2022-42754, CVE-2022-42755, CVE-2022-39133, CVE-2022-42771, CVE-2022-42770, CVE-2022-42772, CVE-2022-20456, CVE-2022-20489, CVE-2022-20490, CVE-2022-20492, CVE-2022-20493, CVE-2023-20912, CVE-2023-20916, CVE-2023-20918, CVE-2023-20919, CVE-2023-20920, CVE-2023-20921, CVE-2022-20494, CVE-2023-20908, CVE-2023-20922, CVE-2022-20461, CVE-2023-20904, CVE-2023-20905, CVE-2023-20913, CVE-2023-20915


  • None

Already included in previous updates

  • CVE-2022-32620, CVE-2022-33238, CVE-2022-33268

Vulnerabilities & Exposure Items

  • SVE-2022-2537 (CVE-2023-21430): An out-of-bound read vulnerability in library
  • SVE-2022-2338 (CVE-2023-21429): Implicit intent hijacking vulnerability in ePDG
  • SVE-2022-2320 (CVE-2023-21428): Improper input validation vulnerability in TelephonyUI
  • SVE-2022-2280 (CVE-2023-21427): Improper access control vulnerabilities in NfcTile
  • SVE-2022-2278 (CVE-2023-21426): Hardcoded encryption key vulnerability in NFC
  • SVE-2022-2261 (CVE-2023-21425): Improper access control vulnerability in telecom application
  • SVE-2022-2118 (CVE-2023-21424): Improper Authorization vulnerability in SemChameleonHelper
  • SVE-2022-1967 (CVE-2023-21423): Improper Authorization vulnerability in ChnFileShareKit
  • SVE-2022-1931 (CVE-2023-21422): Improper authorization vulnerability in WifiSevice
  • SVE-2022-1672 (CVE-2023-21421): Improper Handling of Insufficient Permissions or Privileges vulnerability in Knox Service
  • SVE-2022-1364 (CVE-2023-21420): Use of Externally-Controlled Format String vulnerabilities in STST TA
  • SVE-2022-0471 (CVE-2023-21419): A vulnerability in Secure Folder


Trending News

To Top