{"id":28870,"date":"2019-09-04T13:00:05","date_gmt":"2019-09-04T13:00:05","guid":{"rendered":"http:\/\/b06bd7b6-7f87-4a53-a1f5-d88074c83081"},"modified":"2019-09-04T13:00:05","modified_gmt":"2019-09-04T13:00:05","slug":"samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\/","title":{"rendered":"Samsung, Huawei, LG, and Sony phones vulnerable to rogue &#8216;provisioning&#8217; messages"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2019\/09\/04\/eeeff706-df20-446a-978c-0369c188f5e7\/65ca9b32a9f9e028240db2fabff03afa\/smartphone-tinted.png\" class alt=\"smartphone tinted\"><\/span><\/p>\n<p>Hackers can fake a special kind of SMS message that usually comes from mobile operators and trick users into modifying device settings, and, as a result, re-route their email or web traffic through a malicious server.<\/p>\n<p>This attack vector, discovered and detailed in a report published today by cyber-security firm Check Point, is about OMA CP instructions, also known as provisioning messages.<\/p>\n<p><a href=\"http:\/\/www.openmobilealliance.org\/release\/ClientProv\/\" target=\"_blank\" rel=\"noopener noreferrer\">OMA CP<\/a> stands for Open Mobile Alliance Client Provisioning. It refers to a standard through which mobile operators can send network settings to customer devices as special SMS messages.<\/p>\n<p>The process of sending an OMA CP message is called &#8220;provisioning,&#8221; and takes place every time a new device is connected to a mobile operator&#8217;s network, or when the mobile telco makes changes to its internal systems.<\/p>\n<p>But the OMA CP standard is also used by others. For example, large enterprises which manage their own phone fleets use OMA CP messages to deploy company-wide email or web proxy settings to all devices, so employees can access internal email accounts or intranet portals.<\/p>\n<h3>The OMA CP attack<\/h3>\n<p>But in research published today, Check Point researchers said they found that four smartphone makers have not implemented this standard in a secure manner on their devices.<\/p>\n<p>Researchers said they were able to send OMA CP messages to devices from Samsung, Huawei, LG, and Sony, which accepted these messages, even if it didn&#8217;t come from a trusted source.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>Of the four phone brands, the easiest devices to attack were Samsung smartphones. Check Point said this was because Samsung phones accepted any kind of OMA CP message, with no authentication or verification mechanism in place.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\/\" class=\"lazy\" alt=\"OMA CP attack\" data-original=\" https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2019\/09\/04\/8e162a93-0ac1-4ad2-8721-94e967884a5e\/45618804601ba2b1ce44e0bf1079837e\/oma-cp-attack.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2019\/09\/04\/8e162a93-0ac1-4ad2-8721-94e967884a5e\/45618804601ba2b1ce44e0bf1079837e\/oma-cp-attack.png\" class alt=\"OMA CP attack\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: Check Point<\/span><\/p>\n<p>Devices from Huawei, LG, and Sony were a little bit more secure, as they required the sender of an OMA CP message to provide the phone&#8217;s IMSI code before accepting the message.<\/p>\n<p>IMSI codes are 64-bit strings specific to each device, and in telephony networks, it can be the equivalent of an IP address, and is how mobile providers tell each user apart and how they re-route calls and SMS\/MMS messages to each user.<\/p>\n<p>These codes should, in theory, be hard to obtain, but Check Point said they are quite prevalent. First of all, mobile operators provide paid services through which they translate phone numbers into IMSI code for other third-party mobile service providers. This means an attacker seeking to attack a victim could obtain an IMSI from the telco provider itself for a small fee.<\/p>\n<p>Furthermore, almost a third of all Android apps today have access to a device&#8217;s IMSI code based on permissions they require on install. Hackers can use IMSI codes acquired via malicious apps or data leaks at legitimate apps to target specific users with fake OMA CP messages.<\/p>\n<h3>Some vendors ship patches<\/h3>\n<p>The good news is that three of the vendors have patched or are in the process of patching this attack vector, after first being notified of the issue in March this year.<\/p>\n<ul>\n<li>Samsung included a fix addressing this phishing flow in their Security Maintenance Release for May (<a href=\"https:\/\/security.samsungmobile.com\/securityUpdate.smsb\" target=\"_blank\" rel=\"noopener noreferrer\">SVE-2019-14073<\/a>)<\/li>\n<li>LG released their fix in July (<a href=\"https:\/\/lgsecurity.lge.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">LVE-SMP-190006<\/a>)<\/li>\n<li>Huawei is planning to include UI fixes for OMA CP in the next generation of Mate series or P series smartphones.<\/li>\n<\/ul>\n<p>Sony is the only vendor which did not ship a fix. Check Point claims the vendor &#8220;refused to acknowledge the vulnerability, stating that their devices follow the OMA CP specification.&#8221;<\/p>\n<p>Sony Mobile did not return an email sent by ZDNet yesterday seeking additional comments from company regarding the Check Point report.<\/p>\n<h3>An attack that&#8217;s almost impossible to spot<\/h3>\n<p>The attack described by Check Point isn&#8217;t automatic, as users have to press a button and accept to install the attacker&#8217;s new device settings.<\/p>\n<p>However, Check Point also points out that attackers can fake the sender&#8217;s identity and that recipients have no way realistic means to determine who sent these messages. This means there is a real risk that many users would accept new device settings, thinking they came from a real mobile operator.<\/p>\n<p>All in all, this is an attack vector that very few users &#8211;if any &#8212; will be able to safeguard themselves against, and this is why patches from smartphone vendors are important.<\/p>\n<p>In addition, Check Point also recommends that mobile operators block OMA CP messages at the network level, so these type of messages won&#8217;t be able to traverse their networks unless if they&#8217;ve been sent by the operator itself.<\/p>\n<p>For the moment, the simplest action users can take to protect against rogue OMA CP provisioning messages is to decline all by default. If mobile network features stop working, such as MMS services or mobile data, users can then contact their telcos&#8217; support centers and ask operators to re-send the provisioning messages again, knowing they are legitimate.<\/p>\n<p>&#8220;Simply, we can&#8217;t trust those texts anymore,&#8221; Slava Makkaveev, Security Researcher at Check Point, told ZDNet.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fake phone provisioning messages can allow hackers to hijack email or web traffic from legitimate devices. Nearly half of all Android smartphones impacted.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":28871,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-28870","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Samsung, Huawei, LG, and Sony phones vulnerable to rogue &#039;provisioning&#039; messages 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Samsung, Huawei, LG, and Sony phones vulnerable to rogue &#039;provisioning&#039; messages 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-04T13:00:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Samsung, Huawei, LG, and Sony phones vulnerable to rogue &#8216;provisioning&#8217; messages\",\"datePublished\":\"2019-09-04T13:00:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\\\/\"},\"wordCount\":839,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\\\/\",\"name\":\"Samsung, Huawei, LG, and Sony phones vulnerable to rogue 'provisioning' messages 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages.png\",\"datePublished\":\"2019-09-04T13:00:05+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages.png\",\"width\":1000,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Samsung, Huawei, LG, and Sony phones vulnerable to rogue &#8216;provisioning&#8217; messages\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Samsung, Huawei, LG, and Sony phones vulnerable to rogue 'provisioning' messages 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\/","og_locale":"en_US","og_type":"article","og_title":"Samsung, Huawei, LG, and Sony phones vulnerable to rogue 'provisioning' messages 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-09-04T13:00:05+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Samsung, Huawei, LG, and Sony phones vulnerable to rogue &#8216;provisioning&#8217; messages","datePublished":"2019-09-04T13:00:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\/"},"wordCount":839,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\/","url":"https:\/\/www.threatshub.org\/blog\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\/","name":"Samsung, Huawei, LG, and Sony phones vulnerable to rogue 'provisioning' messages 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages.png","datePublished":"2019-09-04T13:00:05+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages.png","width":1000,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/samsung-huawei-lg-and-sony-phones-vulnerable-to-rogue-provisioning-messages\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Samsung, Huawei, LG, and Sony phones vulnerable to rogue &#8216;provisioning&#8217; messages"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28870","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=28870"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28870\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/28871"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=28870"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=28870"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=28870"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}