Skip to main content

CVE-2025-21037: CWE-284: Improper Access Control in Samsung Mobile SamsungNotes

Medium
VulnerabilityCVE-2025-21037cvecve-2025-21037cwe-284
Published: Wed Sep 03 2025 (09/03/2025, 06:05:42 UTC)
Source: CVE Database V5
Vendor/Project: Samsung Mobile
Product: SamsungNotes

Description

Improper access control in Samsung Notes prior to version 4.4.30.63 allows physical attackers to access data across multiple user profiles. User interaction is required for triggering this vulnerability.

AI-Powered Analysis

AILast updated: 09/03/2025, 06:33:46 UTC

Technical Analysis

CVE-2025-21037 is a medium-severity vulnerability classified under CWE-284 (Improper Access Control) affecting Samsung Mobile's SamsungNotes application prior to version 4.4.30.63. The flaw allows a physical attacker with limited privileges to bypass access controls and access data across multiple user profiles on the same device. This vulnerability requires user interaction to be triggered, indicating that the attacker must convince or trick the legitimate user to perform some action to exploit the issue. The CVSS 3.1 base score is 4.1, reflecting a relatively low attack vector (physical access required), low complexity, and low privileges needed, but with a high impact on confidentiality. The vulnerability does not affect integrity or availability. No known exploits are reported in the wild, and no patch links are currently provided, suggesting that remediation may still be pending or in progress. The improper access control likely stems from SamsungNotes failing to enforce strict isolation between user profiles, allowing data leakage when multiple profiles exist on a single device. This is particularly relevant for devices shared among multiple users or in enterprise environments where multiple profiles might be configured for different roles or users.

Potential Impact

For European organizations, the impact of this vulnerability is primarily on confidentiality. If devices running vulnerable versions of SamsungNotes are shared or used in multi-user scenarios, sensitive notes and data could be accessed by unauthorized users with physical access. This could lead to leakage of intellectual property, personal data, or confidential business information. The requirement for user interaction reduces the risk somewhat but does not eliminate it, especially in environments where social engineering or insider threats are possible. The vulnerability could be exploited in scenarios such as shared corporate devices, mobile device management (MDM) environments with multiple profiles, or in sectors where devices are loaned or temporarily used by multiple individuals. Although the vulnerability does not affect data integrity or availability, the confidentiality breach could have regulatory implications under GDPR if personal data is exposed. The absence of known exploits in the wild currently limits immediate risk, but the presence of a public CVE means attackers could develop exploits in the future.

Mitigation Recommendations

Organizations should prioritize updating SamsungNotes to version 4.4.30.63 or later once available to ensure the access control flaw is patched. Until a patch is applied, organizations should enforce strict physical security controls to prevent unauthorized physical access to devices, especially those shared among multiple users. Device administrators should review and limit the use of multiple user profiles on Samsung devices where possible, reducing the attack surface. Additionally, user awareness training should emphasize the risks of social engineering and the importance of not interacting with suspicious prompts or requests on their devices. Mobile Device Management (MDM) solutions can be configured to restrict profile creation and enforce encryption and access policies on Samsung devices. Regular audits of device configurations and installed app versions should be conducted to identify vulnerable devices. Finally, organizations should monitor Samsung's security advisories for official patches and guidance.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SamsungMobile
Date Reserved
2024-11-06T02:30:14.887Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b7dd8fad5a09ad00edd206

Added to database: 9/3/2025, 6:17:51 AM

Last enriched: 9/3/2025, 6:33:46 AM

Last updated: 9/3/2025, 8:35:38 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats