US Cybersecurity Agency Adds Exploited Samsung Smartphone Vulnerabilities to Catalog

The US Cybersecurity and Infrastructure Security Agency (CISA) has recently added several vulnerabilities affecting Samsung smartphones to its Known Exploited Vulnerabilities Catalog. These vulnerabilities have been identified as potential targets for exploitation by a commercial spyware vendor. In addition to the Samsung smartphone vulnerabilities, CISA also included D-Link router and access point vulnerabilities in its catalog, which were targeted by a variant of the Mirai botnet. This article provides a detailed overview of the vulnerabilities, their fixes, and the implications for cybersecurity.

Inclusion of Samsung smartphone vulnerabilities

CISA’s decision to add six flaws affecting Samsung smartphones to its catalog highlights the severity of the vulnerabilities. These vulnerabilities are believed to have been exploited by a commercial spyware vendor, although there are no public reports providing specific details about the exploits. Despite the lack of public information, the inclusion of these vulnerabilities in CISA’s catalog emphasizes their significance and the urgent need for patching.

Addition of D-Link Router and Access Point Vulnerabilities

The catalog update by CISA also included two vulnerabilities affecting D-Link routers and access points. These vulnerabilities were targeted by a Mirai botnet variant, further underscoring the importance of addressing these security weaknesses promptly. As with the Samsung smartphone vulnerabilities, these exploits serve as a reminder of the continuous threats faced by digital infrastructure and the importance of timely vulnerability management.

Description of Samsung smartphone vulnerabilities

The catalog update by CISA outlined several vulnerabilities affecting Samsung smartphones. Among them is CVE-2021-25487, which is an out-of-bounds read flaw in the modem interface driver. This vulnerability has the potential for arbitrary code execution and was resolved in October 2021 through a security patch. Another vulnerability, CVE-2021-25489, is a low-severity format string bug in the modem interface driver that could lead to a denial-of-service (DoS) condition. Samsung addressed this issue with a patch in October 2021 as well.

Additionally, CISA added CVE-2021-25394 and CVE-2021-25395 to the catalog, which are moderate-severity use-after-free bugs in the MFC charger driver. These vulnerabilities were fixed by Samsung in May 2021. Two other moderate-severity vulnerabilities, CVE-2021-25371 and CVE-2021-25372, were also included. CVE-2021-25371 allows an attacker to load arbitrary ELF files inside the DSP driver, while CVE-2021-25372 is an out-of-bounds access vulnerability in the same driver. Both of these vulnerabilities were patched by Samsung in March 2021.

Lack of warning from Samsung

One concerning aspect is that Samsung has not updated its advisories to warn users about the exploitation of these vulnerabilities. This lack of warning may leave users unaware of the potential risks and the urgency of patching their devices. It is crucial for device manufacturers to communicate and educate their users about the presence of vulnerabilities and the necessity of taking prompt action to mitigate them.

Likelihood of Exploitation by Commercial Spyware Vendor

Although there are no public reports explicitly describing the exploitation of the Samsung smartphone vulnerabilities on CISA’s ‘must-patch’ list, it is highly probable that these flaws have been exploited by a commercial spyware vendor. The inclusion of the vulnerabilities in CISA’s catalog suggests that they have been identified as potential targets for exploitation. This emphasizes the need for users to apply security patches promptly to protect their devices and data.

Recent warnings by Samsung and CISA

In addition to the vulnerabilities added to CISA’s catalog, both Samsung and CISA have recently warned users about another vulnerability, CVE-2023-21492. This vulnerability involves a kernel pointer exposure issue related to log files and can allow a privileged local attacker to bypass the ASLR exploit mitigation technique. The joint warning by Samsung and CISA stresses the importance of addressing this vulnerability promptly and reinforces the significance of proactive vulnerability management practices.

Previous Similar Exploited Samsung Phone Vulnerabilities

In November 2022, Google disclosed details of three similar Samsung phone vulnerabilities with 2021 CVEs that were exploited by an unnamed spyware vendor. These vulnerabilities were exploited even when they were in their zero-day status, further highlighting the sophistication and persistence of attackers. The disclosure serves as a reminder that vulnerabilities in mobile devices can be actively exploited, emphasizing the need for regular security updates and robust protections.

The addition of exploited Samsung smartphone vulnerabilities to CISA’s catalog reinforces the importance of maintaining a proactive approach to cybersecurity. Users must apply security patches promptly to protect against potential risks. Additionally, device manufacturers like Samsung need to actively communicate and provide updated advisories to ensure users are informed about any vulnerabilities and the urgency of patching. By addressing vulnerabilities collectively, users, manufacturers, and cybersecurity agencies can work together to enhance the security and resilience of digital ecosystems.

Explore more

How Firm Size Shapes Embedded Finance Strategy

The rapid transformation of mundane business platforms into sophisticated financial ecosystems has effectively redrawn the competitive boundaries for companies operating in the modern economy. In this environment, the integration of banking, payments, and lending services directly into a non-financial company’s digital interface is no longer a luxury for the avant-garde but a baseline requirement for economic viability. Whether a company

What Is Embedded Finance vs. BaaS in the 2026 Landscape?

The modern consumer no longer wakes up with the intention of visiting a bank, because the very concept of a financial institution has migrated from a physical storefront into the digital oxygen of everyday life. This transformation marks the definitive end of banking as a standalone chore, replacing it with a fluid experience where capital management is an invisible byproduct

How Can Payroll Analytics Improve Government Efficiency?

While the hum of a government office often suggests a routine of paperwork and protocol, the digital pulses within its payroll systems represent the heartbeat of a nation’s economic stability. In many public administrations, payroll data is viewed as little more than a digital receipt—a record of transactions that concludes once a salary reaches a bank account. Yet, this information

Global RPA Market to Hit $50 Billion by 2033 as AI Adoption Surges

The quiet hum of high-speed data processing has replaced the frantic clicking of keyboards in modern back offices, marking a permanent shift in how global businesses manage their most critical internal operations. This transition is not merely about speed; it is about the fundamental transformation of human-led workflows into self-sustaining digital systems. As organizations move deeper into the current decade,

New AGILE Framework to Guide AI in Canada’s Financial Sector

The quiet hum of servers across Canada’s financial heartland now dictates more than just basic transactions; it increasingly determines who qualifies for a mortgage or how a retirement fund reacts to global volatility. As algorithms transition from the shadows of back-office automation to the forefront of consumer-facing decisions, the stakes for oversight have never been higher. The findings from the