Sunday, December 29, 2024
HomeAndroidNokia 9 PureView Fingerprint Scanner Bypassed using Chewing Gum Packet

Nokia 9 PureView Fingerprint Scanner Bypassed using Chewing Gum Packet

Published on

SIEM as a Service

Nokia released updates to fix Nokia 9 PureView’s unreliable in-display fingerprint sensor, but the update turns buggy.

After the update, multiple users complained that the phone can be bypassed now with an unregistered fingerprint or with a Chewing Gum Packet.

The Nokia 9 Fingerprint Scanner wasn’t reliable and the update was provided to address the scanner’s poor performance.

- Advertisement - SIEM as a Service

But the update results in the security flaw, which allows anyone to bypass the phone using a chewing gum packet, unregistered fingerprints, coin, and leather gloves.

Another user reported that flaw exists with Fingerprint Scanner, even before the update.

The latest update Pie Build v4.22C made the bug worse than it was, it allows strangers to bypass the phone.

We believe HMD will fix them right away, possibly the problem relies on the tweaked algorithm which unlocks the device if certain conditions are met.

In the meantime, users are recommended to use different authentication method such as PIN, password or facial recognition.

Earlier this month, a security flaw in Samsung’s Galaxy S10 ultrasonic biometric fingerprint scanner was bypassed by just having the duped 3D Printed Fingerprint of the mobile owner.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Android Security Update – Code Execution Flaw Let Hackers Control Your Android Device Remotely – Update Now

New Android Malware “BasBanke” Steal Financial Data Such as Credentials & Credit/Debit Card Numbers

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a...

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated...

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms...

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated...

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms...

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo...