The flaws could also have helped attackers obtain usernames, phone numbers, voice history, and installed skills, says Check Point Research.The flaws could also have helped attackers obtain usernames, phone numbers, voice history, and installed skills, says Check Point Research.