Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-39884: CWE-284 Improper Access Control in Samsung Mobile Samsung Mobile Devices

0
Medium
VulnerabilityCVE-2022-39884cvecve-2022-39884cwe-284
Published: Wed Nov 09 2022 (11/09/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Samsung Mobile
Product: Samsung Mobile Devices

Description

Improper access control vulnerability in IImsService prior to SMR Nov-2022 Release 1 allows local attacker to access to Call information.

AI-Powered Analysis

AILast updated: 06/25/2025, 21:13:02 UTC

Technical Analysis

CVE-2022-39884 is an improper access control vulnerability (CWE-284) identified in Samsung Mobile devices running Android versions Q (10), R (11), and S (12) prior to the November 2022 Security Maintenance Release (SMR). The vulnerability resides in the IImsService component, which is responsible for handling IMS (IP Multimedia Subsystem) services, including telephony and call management functions. Due to insufficient access control checks, a local attacker—someone with access to the device but without elevated privileges—can exploit this flaw to gain unauthorized access to call information. This includes metadata about calls such as call logs or call state information, potentially exposing sensitive user data. The vulnerability does not require user interaction or prior authentication, and it can be exploited with low complexity, as indicated by the CVSS vector (AV:L/AC:L/PR:N/UI:N). The scope is considered changed (S:C) because the vulnerability affects the confidentiality of information beyond the vulnerable component itself. However, the impact is limited to confidentiality (C:L), with no direct impact on integrity or availability. There are no known exploits in the wild, and Samsung has not published explicit patch links, but the issue is addressed in the November 2022 SMR update. The vulnerability is rated medium severity with a CVSS score of 4.3, reflecting moderate risk primarily due to the local access requirement and limited impact scope.

Potential Impact

For European organizations, the primary impact of CVE-2022-39884 is the potential leakage of sensitive call information from Samsung mobile devices used within corporate environments. This could lead to privacy violations, exposure of communication patterns, and potential reconnaissance information for further targeted attacks. Organizations relying heavily on Samsung devices for secure communications may face increased risk of data leakage, especially if devices are shared or accessed by unauthorized personnel. While the vulnerability does not allow remote exploitation or direct system compromise, the confidentiality breach could undermine compliance with data protection regulations such as GDPR, particularly if call metadata includes personal or sensitive information. Additionally, sectors with high confidentiality requirements—such as government, finance, and healthcare—may be more affected due to the sensitivity of call data. The lack of impact on integrity and availability limits the risk of operational disruption, but the exposure of call information could facilitate social engineering or insider threats.

Mitigation Recommendations

To mitigate CVE-2022-39884, European organizations should prioritize the following actions: 1) Ensure all Samsung mobile devices are updated to the November 2022 SMR or later, as this update addresses the vulnerability. 2) Implement strict device access controls, including strong lock screen authentication and limiting physical access to authorized users only, to prevent local attackers from exploiting the flaw. 3) Employ Mobile Device Management (MDM) solutions to enforce security policies, monitor device compliance, and remotely wipe or lock devices if compromised. 4) Restrict installation of untrusted applications and avoid granting unnecessary permissions that could facilitate local exploitation. 5) Educate users about the risks of leaving devices unattended and the importance of reporting lost or stolen devices promptly. 6) For highly sensitive environments, consider additional encryption of call logs and communication metadata at the application or device level to reduce exposure. 7) Monitor device logs and network traffic for unusual access patterns to call information that may indicate exploitation attempts. These measures go beyond generic patching advice by focusing on access control hardening and operational security tailored to the local nature of the vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Samsung Mobile
Date Reserved
2022-09-05T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9839c4522896dcbec960

Added to database: 5/21/2025, 9:09:13 AM

Last enriched: 6/25/2025, 9:13:02 PM

Last updated: 2/7/2026, 5:52:41 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats