Saturday, February 8, 2025
HomeAndroidNokia 9 PureView Fingerprint Scanner Bypassed using Chewing Gum Packet

Nokia 9 PureView Fingerprint Scanner Bypassed using Chewing Gum Packet

Published on

SIEM as a Service

Follow Us on Google News

Nokia released updates to fix Nokia 9 PureView’s unreliable in-display fingerprint sensor, but the update turns buggy.

After the update, multiple users complained that the phone can be bypassed now with an unregistered fingerprint or with a Chewing Gum Packet.

The Nokia 9 Fingerprint Scanner wasn’t reliable and the update was provided to address the scanner’s poor performance.

But the update results in the security flaw, which allows anyone to bypass the phone using a chewing gum packet, unregistered fingerprints, coin, and leather gloves.

Another user reported that flaw exists with Fingerprint Scanner, even before the update.

The latest update Pie Build v4.22C made the bug worse than it was, it allows strangers to bypass the phone.

We believe HMD will fix them right away, possibly the problem relies on the tweaked algorithm which unlocks the device if certain conditions are met.

In the meantime, users are recommended to use different authentication method such as PIN, password or facial recognition.

Earlier this month, a security flaw in Samsung’s Galaxy S10 ultrasonic biometric fingerprint scanner was bypassed by just having the duped 3D Printed Fingerprint of the mobile owner.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Android Security Update – Code Execution Flaw Let Hackers Control Your Android Device Remotely – Update Now

New Android Malware “BasBanke” Steal Financial Data Such as Credentials & Credit/Debit Card Numbers

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services...

Hackers Leveraging Image & Video Attachments to Deliver Malware

Cybercriminals are increasingly exploiting image and video files to deliver malware, leveraging advanced techniques...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services...