Monday, December 4, 2023

Nokia 9 PureView Fingerprint Scanner Bypassed using Chewing Gum Packet

Nokia released updates to fix Nokia 9 PureView’s unreliable in-display fingerprint sensor, but the update turns buggy.

After the update, multiple users complained that the phone can be bypassed now with an unregistered fingerprint or with a Chewing Gum Packet.

The Nokia 9 Fingerprint Scanner wasn’t reliable and the update was provided to address the scanner’s poor performance.

But the update results in the security flaw, which allows anyone to bypass the phone using a chewing gum packet, unregistered fingerprints, coin, and leather gloves.

Another user reported that flaw exists with Fingerprint Scanner, even before the update.

The latest update Pie Build v4.22C made the bug worse than it was, it allows strangers to bypass the phone.

We believe HMD will fix them right away, possibly the problem relies on the tweaked algorithm which unlocks the device if certain conditions are met.

In the meantime, users are recommended to use different authentication method such as PIN, password or facial recognition.

Earlier this month, a security flaw in Samsung’s Galaxy S10 ultrasonic biometric fingerprint scanner was bypassed by just having the duped 3D Printed Fingerprint of the mobile owner.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Android Security Update – Code Execution Flaw Let Hackers Control Your Android Device Remotely – Update Now

New Android Malware “BasBanke” Steal Financial Data Such as Credentials & Credit/Debit Card Numbers

Website

Latest articles

Hackers Use Weaponized Documents to Attack U.S. Aerospace Industry

An American aerospace company has been the target of a commercial cyberespionage campaign dubbed...

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own...

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Booking.com Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles