Particle.news

Download on the App Store

Samsung Confirms Zero-Click WhatsApp Image Exploit on Galaxy Phones as September Patch Rolls Out

Active attacks target a system image library, prompting immediate installation of the September security update.

Overview

  • Samsung says the flaw is being exploited in the wild on many Galaxy models, with fixes included in its September security update now shipping by region and device.
  • Researchers and media reports attribute the issue to a third‑party image‑analysis library embedded at system level, which WhatsApp uses to process incoming pictures.
  • The attack is zero‑click, as a crafted image can trigger code execution through WhatsApp’s automatic preview without the user opening the file or the app.
  • Devices running Android 13 through 16 are affected across a broad range of Galaxy phones, with Samsung indicating a large share of models from the past five years could be vulnerable.
  • Users are urged to check Settings → Software update → Download and install, enable automatic updates, and apply the latest WhatsApp and system patches linked to the ongoing multi‑vendor image‑processing exploit campaign.