Skip to main content

CVE-2022-39887: CWE-284 Improper Access Control in Samsung Mobile Samsung Mobile Devices

Medium
VulnerabilityCVE-2022-39887cvecve-2022-39887cwe-284
Published: Wed Nov 09 2022 (11/09/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Samsung Mobile
Product: Samsung Mobile Devices

Description

Improper access control vulnerability in clearAllGlobalProxy in MiscPolicy prior to SMR Nov-2022 Release 1 allows local attacker to configure EDM setting.

AI-Powered Analysis

AILast updated: 06/25/2025, 23:13:52 UTC

Technical Analysis

CVE-2022-39887 is an improper access control vulnerability identified in Samsung Mobile Devices, specifically affecting versions Q (Android 10), R (Android 11), and S (Android 12) prior to the November 2022 Security Maintenance Release (SMR). The vulnerability resides in the clearAllGlobalProxy function within the MiscPolicy component. This flaw allows a local attacker—meaning someone with physical or logical access to the device—to manipulate the EDM (Enterprise Device Management) settings without proper authorization. Improper access control (CWE-284) means that the system fails to adequately restrict access to sensitive functions, enabling unauthorized configuration changes. The vulnerability does not require any privileges (PR:N) or user interaction (UI:N) to exploit, but it does require local access (AV:L), limiting remote exploitation. The CVSS v3.1 base score is 4.3 (medium severity), reflecting limited impact on confidentiality (C:N), but a potential impact on integrity (I:L) due to unauthorized modification of device management settings. Availability is unaffected (A:N). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component. No known exploits are reported in the wild, and no official patches are linked in the provided data, though the issue is addressed in the November 2022 SMR. This vulnerability could allow attackers to alter device management policies, potentially bypassing security controls or enforcing malicious configurations on the device, which could lead to further compromise or data leakage in enterprise environments relying on Samsung devices for secure mobile operations.

Potential Impact

For European organizations, especially those with mobile device management (MDM) infrastructures relying on Samsung devices running Android 10 to 12, this vulnerability poses a risk to the integrity of device configurations. Unauthorized changes to EDM settings could undermine corporate security policies, enabling attackers to disable security features, redirect network proxies, or enforce malicious configurations that facilitate data interception or lateral movement within corporate networks. While the vulnerability requires local access, the risk is significant in scenarios where devices are shared, lost, or temporarily accessible to untrusted individuals. This is particularly critical for sectors with high mobility and sensitive data, such as finance, healthcare, and government agencies. The lack of impact on confidentiality and availability reduces the risk of data exfiltration or service disruption directly from this vulnerability, but the integrity compromise could serve as a foothold for more severe attacks. Given the widespread use of Samsung devices in Europe, the vulnerability could affect a large number of endpoints, potentially weakening the overall security posture of affected organizations.

Mitigation Recommendations

1. Immediate deployment of the November 2022 Security Maintenance Release (SMR) from Samsung Mobile on all affected devices to remediate the vulnerability. 2. Implement strict physical security controls and device access policies to minimize the risk of local attackers gaining access to devices. 3. Enforce strong device lock mechanisms (PIN, biometric) to prevent unauthorized local access. 4. Monitor and audit EDM configuration changes regularly through MDM solutions to detect unauthorized modifications promptly. 5. Restrict the installation of untrusted applications and enforce application whitelisting to reduce the risk of local privilege escalation or malicious apps exploiting the vulnerability. 6. Educate users on the risks of leaving devices unattended and the importance of reporting lost or stolen devices immediately. 7. For high-risk environments, consider additional endpoint detection and response (EDR) solutions capable of detecting anomalous configuration changes on mobile devices. 8. Coordinate with Samsung support channels to obtain official patches and verify device firmware versions to ensure compliance.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Samsung Mobile
Date Reserved
2022-09-05T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbec41b

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 6/25/2025, 11:13:52 PM

Last updated: 7/29/2025, 3:17:46 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats