US Cybersecurity Agency Adds Exploited Samsung Smartphone Vulnerabilities to Catalog

The US Cybersecurity and Infrastructure Security Agency (CISA) has recently added several vulnerabilities affecting Samsung smartphones to its Known Exploited Vulnerabilities Catalog. These vulnerabilities have been identified as potential targets for exploitation by a commercial spyware vendor. In addition to the Samsung smartphone vulnerabilities, CISA also included D-Link router and access point vulnerabilities in its catalog, which were targeted by a variant of the Mirai botnet. This article provides a detailed overview of the vulnerabilities, their fixes, and the implications for cybersecurity.

Inclusion of Samsung smartphone vulnerabilities

CISA’s decision to add six flaws affecting Samsung smartphones to its catalog highlights the severity of the vulnerabilities. These vulnerabilities are believed to have been exploited by a commercial spyware vendor, although there are no public reports providing specific details about the exploits. Despite the lack of public information, the inclusion of these vulnerabilities in CISA’s catalog emphasizes their significance and the urgent need for patching.

Addition of D-Link Router and Access Point Vulnerabilities

The catalog update by CISA also included two vulnerabilities affecting D-Link routers and access points. These vulnerabilities were targeted by a Mirai botnet variant, further underscoring the importance of addressing these security weaknesses promptly. As with the Samsung smartphone vulnerabilities, these exploits serve as a reminder of the continuous threats faced by digital infrastructure and the importance of timely vulnerability management.

Description of Samsung smartphone vulnerabilities

The catalog update by CISA outlined several vulnerabilities affecting Samsung smartphones. Among them is CVE-2021-25487, which is an out-of-bounds read flaw in the modem interface driver. This vulnerability has the potential for arbitrary code execution and was resolved in October 2021 through a security patch. Another vulnerability, CVE-2021-25489, is a low-severity format string bug in the modem interface driver that could lead to a denial-of-service (DoS) condition. Samsung addressed this issue with a patch in October 2021 as well.

Additionally, CISA added CVE-2021-25394 and CVE-2021-25395 to the catalog, which are moderate-severity use-after-free bugs in the MFC charger driver. These vulnerabilities were fixed by Samsung in May 2021. Two other moderate-severity vulnerabilities, CVE-2021-25371 and CVE-2021-25372, were also included. CVE-2021-25371 allows an attacker to load arbitrary ELF files inside the DSP driver, while CVE-2021-25372 is an out-of-bounds access vulnerability in the same driver. Both of these vulnerabilities were patched by Samsung in March 2021.

Lack of warning from Samsung

One concerning aspect is that Samsung has not updated its advisories to warn users about the exploitation of these vulnerabilities. This lack of warning may leave users unaware of the potential risks and the urgency of patching their devices. It is crucial for device manufacturers to communicate and educate their users about the presence of vulnerabilities and the necessity of taking prompt action to mitigate them.

Likelihood of Exploitation by Commercial Spyware Vendor

Although there are no public reports explicitly describing the exploitation of the Samsung smartphone vulnerabilities on CISA’s ‘must-patch’ list, it is highly probable that these flaws have been exploited by a commercial spyware vendor. The inclusion of the vulnerabilities in CISA’s catalog suggests that they have been identified as potential targets for exploitation. This emphasizes the need for users to apply security patches promptly to protect their devices and data.

Recent warnings by Samsung and CISA

In addition to the vulnerabilities added to CISA’s catalog, both Samsung and CISA have recently warned users about another vulnerability, CVE-2023-21492. This vulnerability involves a kernel pointer exposure issue related to log files and can allow a privileged local attacker to bypass the ASLR exploit mitigation technique. The joint warning by Samsung and CISA stresses the importance of addressing this vulnerability promptly and reinforces the significance of proactive vulnerability management practices.

Previous Similar Exploited Samsung Phone Vulnerabilities

In November 2022, Google disclosed details of three similar Samsung phone vulnerabilities with 2021 CVEs that were exploited by an unnamed spyware vendor. These vulnerabilities were exploited even when they were in their zero-day status, further highlighting the sophistication and persistence of attackers. The disclosure serves as a reminder that vulnerabilities in mobile devices can be actively exploited, emphasizing the need for regular security updates and robust protections.

The addition of exploited Samsung smartphone vulnerabilities to CISA’s catalog reinforces the importance of maintaining a proactive approach to cybersecurity. Users must apply security patches promptly to protect against potential risks. Additionally, device manufacturers like Samsung need to actively communicate and provide updated advisories to ensure users are informed about any vulnerabilities and the urgency of patching. By addressing vulnerabilities collectively, users, manufacturers, and cybersecurity agencies can work together to enhance the security and resilience of digital ecosystems.

Explore more