A security researcher has discovered around 40 zero- in Samsung’s Tizen operating system.
Samsung adopted Tizen – a Linux-based OS developed in partnership with Intel and based on Nokia and Intel’s failed MeeGo – to reduce its dependency on Google’s Android operating system and is deploying it in TVs, smartphones, watches and other devices.
According to Israeli security researcher Amihai Neiderman, head of research at Equus Software in Israel, almost every system app is vulnerable to attack, but in a presentation at Kaspersky’s Security Analyst Summit in St. Martin, he said that some of the bugs found in the OS “felt like 2005”.
He claimed that Tizen was “maybe the worst code I’ve ever seen”. He tested his findings on a Samsung smart TV as well as two Tizen smartphones, the Samsung Z1 and Z3, which he purchased on eBay.
He claimed that all the security holes found were critical and would enable a hacker to control a Samsung device remotely.
He noted the TV implementation of the software was particularly bad. Its TizenStore app (Samsung’s version of the App Store), could be hijacked and inject malicious code into a Tizen device, changing parts of the system to gain control of devices.
Another issue was the reuse of code from Bada, Tizen’s predecessor operating system. But new code also had problems.
One function, called “strcpy()”, has a buffer overflow exploit, while another fails to use SSL encryption when transmitting certain data.
“They made a lot of wrong assumptions about where they needed encryption,” he said. “It’s extra work to move between secure connections and unsecure connections.”
Tizen is Samsung’s attempt to move beyond using Android in its devices, particularly its smartphones, in a bid to have more control over both the hardware and software its sells. Neiderman said that the company should reconsider widespread deployment of the OS until there has been a major overhaul of the code.
Samsung has told the press that it is “fully committed” to working with Neiderman to mitigate flaws.