Skip to main content

CVE-2025-21041: CWE-922 Insecure Storage of Sensitive Information in Samsung Mobile Secure Folder

Medium
VulnerabilityCVE-2025-21041cvecve-2025-21041cwe-922
Published: Wed Sep 03 2025 (09/03/2025, 06:05:47 UTC)
Source: CVE Database V5
Vendor/Project: Samsung Mobile
Product: Secure Folder

Description

Insecure Storage of Sensitive Information in Secure Folder prior to Android 16 allows local attackers to access sensitive information.

AI-Powered Analysis

AILast updated: 09/03/2025, 06:32:48 UTC

Technical Analysis

CVE-2025-21041 is a vulnerability identified in Samsung Mobile's Secure Folder feature, affecting versions prior to Android 16. The issue is classified under CWE-922, which pertains to the insecure storage of sensitive information. Secure Folder is designed to provide a secure environment on Samsung devices for storing sensitive data and applications separately from the main operating system. However, this vulnerability allows local attackers—those with physical or local access to the device—to access sensitive information stored within the Secure Folder. The vulnerability does not require any user interaction or privileges (no authentication needed), and the attack vector is local (AV:L), meaning the attacker must have physical or local access to the device. The CVSS 3.1 base score is 6.2 (medium severity), reflecting high impact on confidentiality (C:H), but no impact on integrity or availability (I:N, A:N). This suggests that while the attacker can read sensitive data, they cannot modify or disrupt it. The vulnerability arises from improper or insufficient encryption or access controls within the Secure Folder's storage mechanisms, allowing unauthorized data extraction. No known exploits are currently reported in the wild, and no patches or fixes have been linked yet. The vulnerability was reserved in November 2024 and published in September 2025, indicating recent discovery and disclosure. Given the nature of the vulnerability, it primarily threatens the confidentiality of sensitive user data stored in Secure Folder, such as personal documents, credentials, or corporate information, especially if the device is lost, stolen, or accessed by unauthorized individuals locally.

Potential Impact

For European organizations, this vulnerability poses a significant risk to data confidentiality, particularly for employees using Samsung devices with Secure Folder to store sensitive corporate or personal information. The ability of a local attacker to access sensitive data without authentication could lead to data breaches involving personal identifiable information (PII), intellectual property, or confidential business data. This is especially critical for sectors with strict data protection regulations such as GDPR, where unauthorized data disclosure can result in severe legal and financial penalties. The vulnerability could also undermine trust in mobile device security, impacting mobile workforce productivity and security posture. Since the attack requires local access, the risk is heightened in scenarios involving device theft, loss, or insider threats. The lack of impact on integrity and availability means the threat is primarily data leakage rather than system disruption. However, the exposure of sensitive credentials or information could facilitate further attacks or unauthorized access to corporate networks.

Mitigation Recommendations

European organizations should implement several targeted mitigations beyond generic advice: 1) Enforce strict physical security policies for mobile devices, including mandatory use of strong device-level authentication (PIN, biometrics) and remote wipe capabilities to mitigate risks from lost or stolen devices. 2) Limit the use of Samsung Secure Folder for storing highly sensitive corporate data until a patch is available. 3) Monitor device usage and access logs for signs of unauthorized local access or tampering. 4) Educate employees on the risks of local device access and encourage immediate reporting of lost or stolen devices. 5) Deploy Mobile Device Management (MDM) solutions that can enforce encryption policies, restrict Secure Folder usage, and remotely manage device security settings. 6) Stay alert for official Samsung patches or updates addressing this vulnerability and prioritize their deployment. 7) Consider alternative secure storage solutions with verified security controls for critical data until the vulnerability is resolved. 8) For high-risk roles, consider additional endpoint security controls or device hardening to reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SamsungMobile
Date Reserved
2024-11-06T02:30:14.888Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b7dd8fad5a09ad00edd212

Added to database: 9/3/2025, 6:17:51 AM

Last enriched: 9/3/2025, 6:32:48 AM

Last updated: 9/3/2025, 9:51:45 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats