US Cybersecurity Agency Adds Exploited Samsung Smartphone Vulnerabilities to Catalog

The US Cybersecurity and Infrastructure Security Agency (CISA) has recently added several vulnerabilities affecting Samsung smartphones to its Known Exploited Vulnerabilities Catalog. These vulnerabilities have been identified as potential targets for exploitation by a commercial spyware vendor. In addition to the Samsung smartphone vulnerabilities, CISA also included D-Link router and access point vulnerabilities in its catalog, which were targeted by a variant of the Mirai botnet. This article provides a detailed overview of the vulnerabilities, their fixes, and the implications for cybersecurity.

Inclusion of Samsung smartphone vulnerabilities

CISA’s decision to add six flaws affecting Samsung smartphones to its catalog highlights the severity of the vulnerabilities. These vulnerabilities are believed to have been exploited by a commercial spyware vendor, although there are no public reports providing specific details about the exploits. Despite the lack of public information, the inclusion of these vulnerabilities in CISA’s catalog emphasizes their significance and the urgent need for patching.

Addition of D-Link Router and Access Point Vulnerabilities

The catalog update by CISA also included two vulnerabilities affecting D-Link routers and access points. These vulnerabilities were targeted by a Mirai botnet variant, further underscoring the importance of addressing these security weaknesses promptly. As with the Samsung smartphone vulnerabilities, these exploits serve as a reminder of the continuous threats faced by digital infrastructure and the importance of timely vulnerability management.

Description of Samsung smartphone vulnerabilities

The catalog update by CISA outlined several vulnerabilities affecting Samsung smartphones. Among them is CVE-2021-25487, which is an out-of-bounds read flaw in the modem interface driver. This vulnerability has the potential for arbitrary code execution and was resolved in October 2021 through a security patch. Another vulnerability, CVE-2021-25489, is a low-severity format string bug in the modem interface driver that could lead to a denial-of-service (DoS) condition. Samsung addressed this issue with a patch in October 2021 as well.

Additionally, CISA added CVE-2021-25394 and CVE-2021-25395 to the catalog, which are moderate-severity use-after-free bugs in the MFC charger driver. These vulnerabilities were fixed by Samsung in May 2021. Two other moderate-severity vulnerabilities, CVE-2021-25371 and CVE-2021-25372, were also included. CVE-2021-25371 allows an attacker to load arbitrary ELF files inside the DSP driver, while CVE-2021-25372 is an out-of-bounds access vulnerability in the same driver. Both of these vulnerabilities were patched by Samsung in March 2021.

Lack of warning from Samsung

One concerning aspect is that Samsung has not updated its advisories to warn users about the exploitation of these vulnerabilities. This lack of warning may leave users unaware of the potential risks and the urgency of patching their devices. It is crucial for device manufacturers to communicate and educate their users about the presence of vulnerabilities and the necessity of taking prompt action to mitigate them.

Likelihood of Exploitation by Commercial Spyware Vendor

Although there are no public reports explicitly describing the exploitation of the Samsung smartphone vulnerabilities on CISA’s ‘must-patch’ list, it is highly probable that these flaws have been exploited by a commercial spyware vendor. The inclusion of the vulnerabilities in CISA’s catalog suggests that they have been identified as potential targets for exploitation. This emphasizes the need for users to apply security patches promptly to protect their devices and data.

Recent warnings by Samsung and CISA

In addition to the vulnerabilities added to CISA’s catalog, both Samsung and CISA have recently warned users about another vulnerability, CVE-2023-21492. This vulnerability involves a kernel pointer exposure issue related to log files and can allow a privileged local attacker to bypass the ASLR exploit mitigation technique. The joint warning by Samsung and CISA stresses the importance of addressing this vulnerability promptly and reinforces the significance of proactive vulnerability management practices.

Previous Similar Exploited Samsung Phone Vulnerabilities

In November 2022, Google disclosed details of three similar Samsung phone vulnerabilities with 2021 CVEs that were exploited by an unnamed spyware vendor. These vulnerabilities were exploited even when they were in their zero-day status, further highlighting the sophistication and persistence of attackers. The disclosure serves as a reminder that vulnerabilities in mobile devices can be actively exploited, emphasizing the need for regular security updates and robust protections.

The addition of exploited Samsung smartphone vulnerabilities to CISA’s catalog reinforces the importance of maintaining a proactive approach to cybersecurity. Users must apply security patches promptly to protect against potential risks. Additionally, device manufacturers like Samsung need to actively communicate and provide updated advisories to ensure users are informed about any vulnerabilities and the urgency of patching. By addressing vulnerabilities collectively, users, manufacturers, and cybersecurity agencies can work together to enhance the security and resilience of digital ecosystems.

Explore more

Jenacie AI Debuts Automated Trading With 80% Returns

We’re joined by Nikolai Braiden, a distinguished FinTech expert and an early advocate for blockchain technology. With a deep understanding of how technology is reshaping digital finance, he provides invaluable insight into the innovations driving the industry forward. Today, our conversation will explore the profound shift from manual labor to full automation in financial trading. We’ll delve into the mechanics

Chronic Care Management Retains Your Best Talent

With decades of experience helping organizations navigate change through technology, HRTech expert Ling-yi Tsai offers a crucial perspective on one of today’s most pressing workplace challenges: the hidden costs of chronic illness. As companies grapple with retention and productivity, Tsai’s insights reveal how integrated health benefits are no longer a perk, but a strategic imperative. In our conversation, we explore

DianaHR Launches Autonomous AI for Employee Onboarding

With decades of experience helping organizations navigate change through technology, HRTech expert Ling-Yi Tsai is at the forefront of the AI revolution in human resources. Today, she joins us to discuss a groundbreaking development from DianaHR: a production-grade AI agent that automates the entire employee onboarding process. We’ll explore how this agent “thinks,” the synergy between AI and human specialists,

Is Your Agency Ready for AI and Global SEO?

Today we’re speaking with Aisha Amaira, a leading MarTech expert who specializes in the intricate dance between technology, marketing, and global strategy. With a deep background in CRM technology and customer data platforms, she has a unique vantage point on how innovation shapes customer insights. We’ll be exploring a significant recent acquisition in the SEO world, dissecting what it means

Trend Analysis: BNPL for Essential Spending

The persistent mismatch between rigid bill due dates and the often-variable cadence of personal income has long been a source of financial stress for households, creating a gap that innovative financial tools are now rushing to fill. Among the most prominent of these is Buy Now, Pay Later (BNPL), a payment model once synonymous with discretionary purchases like electronics and