Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-39879: CWE-285: Improper Authorization in Samsung Mobile Samsung Mobile Devices

0
Medium
VulnerabilityCVE-2022-39879cvecve-2022-39879cwe-285
Published: Wed Nov 09 2022 (11/09/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Samsung Mobile
Product: Samsung Mobile Devices

Description

Improper authorization vulnerability in?CallBGProvider prior to SMR Nov-2022 Release 1 allows local attacker to grant permission for accessing information with phone uid.

AI-Powered Analysis

AILast updated: 06/25/2025, 23:14:47 UTC

Technical Analysis

CVE-2022-39879 is an improper authorization vulnerability identified in Samsung Mobile Devices, specifically affecting versions R (Android 11) and S (Android 12) prior to the November 2022 Security Maintenance Release (SMR). The vulnerability resides in the CallBGProvider component, which is responsible for managing background call-related services. Due to improper authorization controls, a local attacker—someone with physical or local access to the device—can exploit this flaw to grant themselves permissions associated with the phone UID. This unauthorized permission escalation allows the attacker to access sensitive information that should otherwise be restricted. The vulnerability is classified under CWE-285 (Improper Authorization), indicating that the system fails to enforce correct access control policies. The CVSS v3.1 base score is 5.9 (medium severity), with vector AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L, meaning the attack requires local access but no privileges or user interaction, and can impact confidentiality, integrity, and availability to a limited extent. No known exploits have been reported in the wild, and no official patches are linked in the provided data, though the issue is addressed in the November 2022 SMR update. The vulnerability's exploitation scope is limited to local attackers, but the impact includes unauthorized access to potentially sensitive telephony information, which could facilitate further attacks or privacy breaches.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily in environments where Samsung mobile devices are widely used and where local access to devices cannot be strictly controlled. The improper authorization flaw could allow malicious insiders or attackers with temporary physical access to escalate privileges and access sensitive telephony data, potentially leading to information leakage or enabling further attacks such as call interception, fraud, or unauthorized data extraction. Organizations in sectors with high data protection requirements—such as finance, healthcare, and government—may face compliance risks if sensitive information is exposed. Additionally, the vulnerability could undermine endpoint security postures, especially in Bring Your Own Device (BYOD) scenarios common in European workplaces. While remote exploitation is not feasible, the risk remains significant in scenarios involving device theft, loss, or insider threats. The lack of known exploits reduces immediate risk, but the medium severity rating and the sensitive nature of telephony data warrant prompt mitigation.

Mitigation Recommendations

1. Immediate deployment of the November 2022 Security Maintenance Release (SMR) or later updates from Samsung Mobile to ensure the vulnerability is patched. 2. Enforce strict physical security policies to prevent unauthorized local access to devices, including device lock policies, secure storage, and employee awareness training. 3. Implement Mobile Device Management (MDM) solutions that can enforce security policies, remotely lock or wipe devices, and monitor for suspicious activity. 4. Restrict the use of Samsung devices running affected versions in high-security environments until patched. 5. Conduct regular audits of device permissions and installed applications to detect any unauthorized changes. 6. Educate users on the risks of leaving devices unattended and the importance of strong authentication mechanisms (PIN, biometrics). 7. For organizations with BYOD policies, enforce minimum OS version requirements and patch compliance before granting network access. 8. Monitor telephony-related logs and alerts for unusual access patterns that might indicate exploitation attempts. These steps go beyond generic advice by focusing on patch management, physical security, device control, and user behavior tailored to the nature of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Samsung Mobile
Date Reserved
2022-09-05T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbec3e3

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 6/25/2025, 11:14:47 PM

Last updated: 2/7/2026, 4:08:27 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats