US Cybersecurity Agency Adds Exploited Samsung Smartphone Vulnerabilities to Catalog

The US Cybersecurity and Infrastructure Security Agency (CISA) has recently added several vulnerabilities affecting Samsung smartphones to its Known Exploited Vulnerabilities Catalog. These vulnerabilities have been identified as potential targets for exploitation by a commercial spyware vendor. In addition to the Samsung smartphone vulnerabilities, CISA also included D-Link router and access point vulnerabilities in its catalog, which were targeted by a variant of the Mirai botnet. This article provides a detailed overview of the vulnerabilities, their fixes, and the implications for cybersecurity.

Inclusion of Samsung smartphone vulnerabilities

CISA’s decision to add six flaws affecting Samsung smartphones to its catalog highlights the severity of the vulnerabilities. These vulnerabilities are believed to have been exploited by a commercial spyware vendor, although there are no public reports providing specific details about the exploits. Despite the lack of public information, the inclusion of these vulnerabilities in CISA’s catalog emphasizes their significance and the urgent need for patching.

Addition of D-Link Router and Access Point Vulnerabilities

The catalog update by CISA also included two vulnerabilities affecting D-Link routers and access points. These vulnerabilities were targeted by a Mirai botnet variant, further underscoring the importance of addressing these security weaknesses promptly. As with the Samsung smartphone vulnerabilities, these exploits serve as a reminder of the continuous threats faced by digital infrastructure and the importance of timely vulnerability management.

Description of Samsung smartphone vulnerabilities

The catalog update by CISA outlined several vulnerabilities affecting Samsung smartphones. Among them is CVE-2021-25487, which is an out-of-bounds read flaw in the modem interface driver. This vulnerability has the potential for arbitrary code execution and was resolved in October 2021 through a security patch. Another vulnerability, CVE-2021-25489, is a low-severity format string bug in the modem interface driver that could lead to a denial-of-service (DoS) condition. Samsung addressed this issue with a patch in October 2021 as well.

Additionally, CISA added CVE-2021-25394 and CVE-2021-25395 to the catalog, which are moderate-severity use-after-free bugs in the MFC charger driver. These vulnerabilities were fixed by Samsung in May 2021. Two other moderate-severity vulnerabilities, CVE-2021-25371 and CVE-2021-25372, were also included. CVE-2021-25371 allows an attacker to load arbitrary ELF files inside the DSP driver, while CVE-2021-25372 is an out-of-bounds access vulnerability in the same driver. Both of these vulnerabilities were patched by Samsung in March 2021.

Lack of warning from Samsung

One concerning aspect is that Samsung has not updated its advisories to warn users about the exploitation of these vulnerabilities. This lack of warning may leave users unaware of the potential risks and the urgency of patching their devices. It is crucial for device manufacturers to communicate and educate their users about the presence of vulnerabilities and the necessity of taking prompt action to mitigate them.

Likelihood of Exploitation by Commercial Spyware Vendor

Although there are no public reports explicitly describing the exploitation of the Samsung smartphone vulnerabilities on CISA’s ‘must-patch’ list, it is highly probable that these flaws have been exploited by a commercial spyware vendor. The inclusion of the vulnerabilities in CISA’s catalog suggests that they have been identified as potential targets for exploitation. This emphasizes the need for users to apply security patches promptly to protect their devices and data.

Recent warnings by Samsung and CISA

In addition to the vulnerabilities added to CISA’s catalog, both Samsung and CISA have recently warned users about another vulnerability, CVE-2023-21492. This vulnerability involves a kernel pointer exposure issue related to log files and can allow a privileged local attacker to bypass the ASLR exploit mitigation technique. The joint warning by Samsung and CISA stresses the importance of addressing this vulnerability promptly and reinforces the significance of proactive vulnerability management practices.

Previous Similar Exploited Samsung Phone Vulnerabilities

In November 2022, Google disclosed details of three similar Samsung phone vulnerabilities with 2021 CVEs that were exploited by an unnamed spyware vendor. These vulnerabilities were exploited even when they were in their zero-day status, further highlighting the sophistication and persistence of attackers. The disclosure serves as a reminder that vulnerabilities in mobile devices can be actively exploited, emphasizing the need for regular security updates and robust protections.

The addition of exploited Samsung smartphone vulnerabilities to CISA’s catalog reinforces the importance of maintaining a proactive approach to cybersecurity. Users must apply security patches promptly to protect against potential risks. Additionally, device manufacturers like Samsung need to actively communicate and provide updated advisories to ensure users are informed about any vulnerabilities and the urgency of patching. By addressing vulnerabilities collectively, users, manufacturers, and cybersecurity agencies can work together to enhance the security and resilience of digital ecosystems.

Explore more

Strategies for Navigating the Shift to 6G Without Vendor Lock-In

The global telecommunications landscape is currently standing at a crossroads where the promise of near-instantaneous connectivity meets the sobering reality of complex architectural transitions. As enterprises begin to look beyond the current capabilities of 5G-Advanced, the move toward 6G is being framed not merely as an incremental boost in peak data rates but as a fundamental reimagining of what a

How Do You Choose the Best Wi-Fi Router in 2026?

Modern households and professional home offices now rely on wireless networking as the invisible backbone of daily existence, making the selection of a router one of the most consequential technology decisions a consumer can face. The current digital landscape is defined by an intricate web of high-bandwidth activities, ranging from immersive virtual reality meetings to the constant telemetry of dozens

Hotels Must Bolster Cybersecurity to Protect Guest Data

The digital transformation of the global hospitality industry has fundamentally altered the relationship between hotels and their guests, turning data protection into a cornerstone of operational integrity. As properties transition into digital-first enterprises, the safeguarding of guest information has evolved from a niche IT task into a vital pillar of brand reputation. This shift is driven by the reality that

How Do Instant Payments Reshape Global Business Standards?

The traditional three-day settlement cycle that once governed global commerce has effectively dissolved into a relic of financial history as real-time payment systems become the universal benchmark for corporate operations. In the current economic landscape of 2026, the speed of capital movement has finally synchronized with the speed of digital information, creating a paradigm where instantaneous transaction finality is no

Can China Dominate the Global 6G Technology Market?

The global telecommunications landscape is currently witnessing a seismic shift as China officially accelerates its pursuit of next-generation connectivity through the approval of expansive field trials and technical standardization protocols for 6G technology. This strategic move, recently sanctioned by the Ministry of Industry and Information Technology, specifically greenlights the extensive use of the 6 GHz frequency band for intensive regional