This allows an attacker to get and access kernel read and write privileges that can expose data. Google's Project Zero team obtained evidence that there is an exploitation chain for several Samsung devices, which came from a commercial surveillance vendor.