Skip to main content

CVE-2025-20973: CWE-287 Improper Authentication in Samsung Mobile Secure Folder

Medium
VulnerabilityCVE-2025-20973cvecve-2025-20973cwe-287
Published: Wed May 07 2025 (05/07/2025, 08:24:29 UTC)
Source: CVE
Vendor/Project: Samsung Mobile
Product: Secure Folder

Description

Improper authentication in Secure Folder prior to version 1.8.12.0 in Android 13, and 1.9.21.00 in Android 14 allows physical attackers to reset the lock type of Secure Folder.

AI-Powered Analysis

AILast updated: 07/05/2025, 13:27:05 UTC

Technical Analysis

CVE-2025-20973 is a medium-severity vulnerability classified under CWE-287 (Improper Authentication) affecting Samsung Mobile's Secure Folder feature on devices running Android 13 (prior to version 1.8.12.0) and Android 14 (prior to version 1.9.21.00). Secure Folder is a security feature designed to isolate and protect sensitive data and applications on Samsung mobile devices by requiring authentication to access its contents. The vulnerability allows a physical attacker with access to the device to reset the lock type of the Secure Folder without proper authentication. This means that an attacker who can physically interact with the device could bypass the intended authentication mechanisms, potentially gaining unauthorized access to sensitive data stored within the Secure Folder. The CVSS v3.1 base score is 5.4, indicating a medium severity level. The vector string (AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N) shows that the attack requires physical access (AV:P), low attack complexity (AC:L), high privileges (PR:H), and user interaction (UI:R). The scope is unchanged (S:U), but the impact on confidentiality and integrity is high (C:H/I:H), with no impact on availability (A:N). No known exploits are currently reported in the wild, and no official patches are linked yet. The vulnerability highlights a critical weakness in the authentication logic of Secure Folder, which is intended to be a strong security boundary on Samsung devices. Exploiting this flaw could allow attackers to circumvent lock protections, exposing confidential data and compromising data integrity within the Secure Folder environment.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to employees and executives using Samsung devices with Secure Folder to store sensitive corporate information, intellectual property, or personal data protected under GDPR. Unauthorized access to Secure Folder could lead to data breaches involving confidential business documents, credentials, or communications. The physical access requirement limits remote exploitation but increases risk in scenarios such as device theft, loss, or insider threats. The high confidentiality and integrity impact means that sensitive data could be exposed or altered without detection, potentially leading to compliance violations, reputational damage, and financial losses. Organizations relying on Samsung devices for secure data segregation should be aware that this vulnerability undermines the trustworthiness of Secure Folder as a security control. The lack of availability impact means device functionality remains intact, but the security boundary is weakened. This vulnerability is particularly concerning for sectors with high data sensitivity such as finance, healthcare, government, and critical infrastructure within Europe.

Mitigation Recommendations

European organizations should take immediate steps to mitigate this vulnerability beyond generic patching advice. First, ensure all Samsung devices are updated to Secure Folder versions 1.8.12.0 or later on Android 13 and 1.9.21.00 or later on Android 14 as soon as official patches become available. Until patches are deployed, enforce strict physical security controls to prevent unauthorized access to devices, including secure storage, device tracking, and rapid reporting of lost or stolen devices. Implement endpoint management policies that restrict use of Secure Folder for highly sensitive data or require additional authentication layers such as biometric verification or multi-factor authentication if supported. Conduct user awareness training emphasizing the risk of physical device compromise and the importance of locking devices when unattended. Consider disabling Secure Folder on devices used in high-risk environments if patching is delayed. Regularly audit device configurations and access logs to detect suspicious activity related to Secure Folder access. Finally, coordinate with Samsung support channels for timely vulnerability disclosures and remediation updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SamsungMobile
Date Reserved
2024-11-06T02:30:14.867Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ac4522896dcbd97f6

Added to database: 5/21/2025, 9:08:42 AM

Last enriched: 7/5/2025, 1:27:05 PM

Last updated: 8/9/2025, 2:52:19 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats