{"id":45753,"date":"2022-03-16T16:34:12","date_gmt":"2022-03-16T16:34:12","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33214\/Researcher-Uses-Dirty-Pipe-Exploits-To-Fully-Root-A-Pixel-6-Pro-And-Samsung-S22.html"},"modified":"2022-03-16T16:34:12","modified_gmt":"2022-03-16T16:34:12","slug":"researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\/","title":{"rendered":"Researcher Uses Dirty Pipe Exploits To Fully Root A Pixel 6 Pro And Samsung S22"},"content":{"rendered":"<figure class=\"intro-image intro-left\"> <img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/03\/android-hack-800x534.jpeg\" alt=\"Stylized illustration of a robot holding a smart tablet.\"><figcaption class=\"caption\"><\/figcaption><\/figure>\n<aside id=\"social-left\" class=\"social-left\" aria-label=\"Read the comments or share this article\"> <a title=\"33 posters participating\" class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/information-technology\/2022\/03\/researcher-uses-dirty-pipe-exploit-to-fully-root-a-pixel-6-pro-and-samsung-s22\/?comments=1\"> <\/p>\n<h4 class=\"comment-count-before\">reader comments<\/h4>\n<p> <span class=\"comment-count-number\">41<\/span> <span class=\"visually-hidden\"> with 33 posters participating<\/span> <\/a> <\/p>\n<div class=\"share-links\">\n<h4>Share this story<\/h4>\n<\/p><\/div>\n<\/aside>\n<p> <!-- cache hit 1272:single\/related:77f4a274cc5ac0e92efbf0eee54049f5 --><!-- empty --><\/p>\n<p>A researcher has successfully used the critical Dirty Pipe vulnerability in Linux to fully root two models of Android phones\u2014a Pixel 6 Pro and Samsung S22\u2014in a hack that demonstrates the power of exploiting the newly discovered OS flaw.<\/p>\n<p>The researcher chose those two handset models for a good reason: they are two of the few\u2014if not the only\u2014devices known to run Android version 5.10.43, the only release of Google&#8217;s mobile OS that&#8217;s vulnerable to Dirty Pipe. Because the LPE, or local privilege escalation, vulnerability wasn&#8217;t introduced until the recently released version 5.8 of the Linux kernel, the universe of exploitable devices\u2014whether mobile, Internet of Things, or servers and desktops\u2014is relatively small.<\/p>\n<h2>Behold, a reverse shell with root privileges<\/h2>\n<p>But for devices that do package affected Linux kernel versions, Dirty Pipe offers hackers\u2014both benign and malicious\u2014a platform for bypassing normal security controls and gaining full root control. From there, a malicious app could surreptitiously steal authentication credentials, photos, files, messages, and other sensitive data. As I <a href=\"https:\/\/arstechnica.com\/information-technology\/2022\/03\/linux-has-been-bitten-by-its-most-high-severity-vulnerability-in-years\/\">reported last week<\/a>, Dirty Pipe is among the most serious Linux threats to be disclosed since 2016, the year another high-severity and easy-to-exploit Linux flaw named Dirty Cow came to light.<\/p>\n<p>Android uses security mechanisms such as <a href=\"https:\/\/www.redhat.com\/en\/topics\/linux\/what-is-selinux\">SELinux<\/a> and sandboxing, which often make exploits hard, if not impossible. Despite the challenge, the successful Android root shows that Dirty Pipe is a viable attack vector against vulnerable devices.<\/p>\n<p>&#8220;It&#8217;s exciting because most Linux kernel vulnerabilities are not going to be useful to exploit Android,&#8221; <a href=\"https:\/\/twitter.com\/chompie1337\">Valentina Palmiotti<\/a>, lead security researcher at security firm Grapl, said in an interview. The exploit &#8220;is notable because there have only been a few public Android LPEs in recent years (compare that to iOS where there have been so many). Though, because it only works on 5.8 kernels and up, it&#8217;s limited to the two devices we saw in the demo.&#8221;<\/p>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<p>In a <a href=\"https:\/\/twitter.com\/Fire30_\/status\/1503422980612923404\">video demonstration<\/a> published on Twitter, a security researcher who asked to be identified only by his Twitter handle <a href=\"https:\/\/twitter.com\/Fire30_\">Fire30<\/a> runs a custom-built app he wrote, first on a Pixel 6 Pro and then a Samsung S22. Within seconds, a reverse shell that gives full root access opens on a computer connected to the same Wi-Fi network. From there, Fire30 has the ability to override most security protections built into Android.<\/p>\n<p>The root achieved is tethered, meaning it can&#8217;t survive a reboot. That means hobbyists who want to root their devices so they have capabilities not normally available would have to perform the procedure each time the phone turns on, a requirement that is unattractive to many rooting aficionados. Researchers, however, may find the technique more valuable, because it allows them to perform diagnostics that otherwise wouldn&#8217;t be possible.<\/p>\n<p>But perhaps the group most interested will be people trying to install malicious wares. As the video shows, attacks have the potential to be fast and stealthy. All that&#8217;s required is local access to the device, usually in the form of it running a malicious app. Even if the universe of vulnerable devices is relatively small, there&#8217;s little doubt Dirty Pipe could be used to thoroughly compromise it.<\/p>\n<p>&#8220;This is a highly reliable exploit that will work without customization on all vulnerable systems,&#8221; Christoph Hebeisen, head of security research at mobile security provider Lookout, wrote in an email. &#8220;This makes it a highly attractive exploit to use for attackers. I expect that weaponized versions of the exploit will appear, and they will be used as a preferred exploit when a vulnerable device is encountered because the exploit is reliable. Also, it may well be included in rooting tools for users rooting their own devices.&#8221;<\/p>\n<p>It also stands to reason that other types of devices running vulnerable versions of Linux can also be easily rooted with Dirty Pipe. On Monday, storage device maker QNAP said that some of its NAS devices are affected by the vulnerability and that company engineers are in the process of investigating precisely how. Currently QNAP has no mitigations available and is recommending users check back and install security updates once they become available.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33214\/Researcher-Uses-Dirty-Pipe-Exploits-To-Fully-Root-A-Pixel-6-Pro-And-Samsung-S22.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":45754,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[9911],"class_list":["post-45753","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerlinuxphoneflaw"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Researcher Uses Dirty Pipe Exploits To Fully Root A Pixel 6 Pro And Samsung S22 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Researcher Uses Dirty Pipe Exploits To Fully Root A Pixel 6 Pro And Samsung S22 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-16T16:34:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/03\/android-hack-800x534.jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Researcher Uses Dirty Pipe Exploits To Fully Root A Pixel 6 Pro And Samsung S22\",\"datePublished\":\"2022-03-16T16:34:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\\\/\"},\"wordCount\":714,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22.jpg\",\"keywords\":[\"headline,hacker,linux,phone,flaw\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\\\/\",\"name\":\"Researcher Uses Dirty Pipe Exploits To Fully Root A Pixel 6 Pro And Samsung S22 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22.jpg\",\"datePublished\":\"2022-03-16T16:34:12+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22.jpg\",\"width\":800,\"height\":534},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,linux,phone,flaw\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerlinuxphoneflaw\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Researcher Uses Dirty Pipe Exploits To Fully Root A Pixel 6 Pro And Samsung S22\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Researcher Uses Dirty Pipe Exploits To Fully Root A Pixel 6 Pro And Samsung S22 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\/","og_locale":"en_US","og_type":"article","og_title":"Researcher Uses Dirty Pipe Exploits To Fully Root A Pixel 6 Pro And Samsung S22 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-03-16T16:34:12+00:00","og_image":[{"url":"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/03\/android-hack-800x534.jpeg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Researcher Uses Dirty Pipe Exploits To Fully Root A Pixel 6 Pro And Samsung S22","datePublished":"2022-03-16T16:34:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\/"},"wordCount":714,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22.jpg","keywords":["headline,hacker,linux,phone,flaw"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\/","url":"https:\/\/www.threatshub.org\/blog\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\/","name":"Researcher Uses Dirty Pipe Exploits To Fully Root A Pixel 6 Pro And Samsung S22 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22.jpg","datePublished":"2022-03-16T16:34:12+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22.jpg","width":800,"height":534},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/researcher-uses-dirty-pipe-exploits-to-fully-root-a-pixel-6-pro-and-samsung-s22\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,linux,phone,flaw","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerlinuxphoneflaw\/"},{"@type":"ListItem","position":3,"name":"Researcher Uses Dirty Pipe Exploits To Fully Root A Pixel 6 Pro And Samsung S22"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45753","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45753"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45753\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/45754"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45753"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45753"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45753"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}