Skip to main content

CVE-2025-20990: CWE-284: Improper Access Control in Samsung Mobile Samsung Mobile Devices

Medium
VulnerabilityCVE-2025-20990cvecve-2025-20990cwe-284
Published: Wed Aug 06 2025 (08/06/2025, 04:22:30 UTC)
Source: CVE Database V5
Vendor/Project: Samsung Mobile
Product: Samsung Mobile Devices

Description

Improper access control in accessing system device node prior to SMR Aug-2025 Release 1 allows local attackers to access device identifier.

AI-Powered Analysis

AILast updated: 08/06/2025, 05:05:36 UTC

Technical Analysis

CVE-2025-20990 is a medium-severity vulnerability classified under CWE-284 (Improper Access Control) affecting Samsung Mobile Devices prior to the SMR (Security Maintenance Release) August 2025 Release 1. The vulnerability arises from improper access control mechanisms when accessing a system device node, which allows local attackers to obtain the device identifier without proper authorization. The device identifier is a sensitive piece of information that can be used for device tracking, profiling, or as a stepping stone for further attacks. The vulnerability does not require user interaction or privileges (PR:N/UI:N), and the attack vector is local (AV:L), meaning the attacker must have local access to the device, such as through a compromised app or physical access. The CVSS v3.1 base score is 4.0, indicating a medium impact primarily on confidentiality, with no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches are explicitly linked yet, though the issue is expected to be addressed in the August 2025 SMR update. This vulnerability highlights a failure in enforcing proper access control policies on sensitive system nodes, which could be leveraged by malicious local actors to gather device-specific information that should otherwise be protected.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the prevalence of Samsung Mobile devices within their workforce and operational environment. The leakage of device identifiers can facilitate targeted attacks, device tracking, or unauthorized profiling, potentially undermining privacy compliance obligations such as GDPR. While the vulnerability does not directly allow code execution or data modification, the exposure of device identifiers can be leveraged in multi-stage attacks or social engineering campaigns. Organizations with Bring Your Own Device (BYOD) policies or those relying heavily on Samsung devices for sensitive communications may face increased risk. Additionally, sectors with high privacy requirements, such as finance, healthcare, and government, could be more sensitive to such information disclosure. However, since exploitation requires local access and no remote attack vector is present, the risk is somewhat mitigated in environments with strong endpoint security and device control policies.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize the following actions: 1) Ensure timely deployment of the SMR August 2025 Release 1 or later updates from Samsung that address this access control flaw. 2) Enforce strict device usage policies limiting local access to trusted applications and users only, reducing the risk of local exploitation. 3) Implement Mobile Device Management (MDM) solutions that can monitor and restrict app permissions and detect anomalous behavior indicative of privilege escalation or unauthorized access attempts. 4) Educate users about the risks of installing untrusted applications or granting excessive permissions that could facilitate local attacks. 5) For highly sensitive environments, consider additional endpoint security controls such as application whitelisting and device encryption to protect data even if device identifiers are exposed. 6) Monitor device logs and security alerts for suspicious local access attempts to system nodes. These targeted measures go beyond generic patching and help reduce the attack surface related to local privilege abuse.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SamsungMobile
Date Reserved
2024-11-06T02:30:14.873Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6892de72ad5a09ad00ee203d

Added to database: 8/6/2025, 4:47:46 AM

Last enriched: 8/6/2025, 5:05:36 AM

Last updated: 8/27/2025, 5:52:32 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats