Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21049: CWE-284: Improper Access Control in Samsung Mobile Samsung Mobile Devices

0
Medium
VulnerabilityCVE-2025-21049cvecve-2025-21049cwe-284
Published: Fri Oct 10 2025 (10/10/2025, 06:33:08 UTC)
Source: CVE Database V5
Vendor/Project: Samsung Mobile
Product: Samsung Mobile Devices

Description

Improper access control in SecSettings prior to SMR Oct-2025 Release 1 allows local attackers to access sensitive information. User interaction is required for triggering this vulnerability.

AI-Powered Analysis

AILast updated: 10/10/2025, 06:46:53 UTC

Technical Analysis

CVE-2025-21049 is a vulnerability classified under CWE-284 (Improper Access Control) found in Samsung Mobile devices, specifically within the SecSettings component prior to the SMR Oct-2025 Release 1 update. This flaw permits local attackers to bypass intended access restrictions and retrieve sensitive information stored or managed by the SecSettings module. The vulnerability requires the attacker to have local access to the device and also necessitates user interaction to trigger the exploit, such as convincing the user to perform an action that enables the attack. The CVSS v3.1 base score is 5.5, indicating a medium severity level. The attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), but user interaction is necessary (UI:R). The scope remains unchanged (S:U), and the impact is high on confidentiality (C:H), with no impact on integrity (I:N) or availability (A:N). No known exploits have been reported in the wild, and no official patches have been linked yet, though the vulnerability is addressed in the SMR Oct-2025 Release 1 update. The vulnerability primarily threatens confidentiality by exposing sensitive information, which could include personal data, credentials, or device configuration details. Since the attack requires local access and user interaction, remote exploitation is not feasible, limiting the attack surface to scenarios involving physical device access or social engineering. This vulnerability highlights the importance of robust access control mechanisms within mobile device settings components, especially those managing sensitive data.

Potential Impact

For European organizations, this vulnerability poses a risk of sensitive information disclosure from Samsung Mobile devices used by employees or within operational environments. Confidential data exposure could lead to privacy violations, intellectual property leaks, or unauthorized access to corporate resources if attackers leverage the disclosed information for further attacks. Sectors such as finance, healthcare, government, and critical infrastructure, which often rely on mobile devices for secure communications and data access, could be particularly impacted. The requirement for local access and user interaction reduces the likelihood of widespread exploitation but does not eliminate risks from insider threats or targeted attacks involving social engineering. The absence of integrity and availability impacts means the vulnerability does not directly enable data manipulation or service disruption, but confidentiality breaches alone can have significant regulatory and reputational consequences under GDPR and other European data protection laws.

Mitigation Recommendations

1. Limit physical access to Samsung Mobile devices, especially in sensitive environments, to reduce the risk of local exploitation. 2. Educate users on the risks of social engineering and the importance of cautious interaction with prompts or requests that could trigger the vulnerability. 3. Monitor devices for unusual local activity or attempts to access SecSettings or related sensitive components. 4. Deploy mobile device management (MDM) solutions to enforce security policies, restrict unauthorized local access, and remotely wipe compromised devices if necessary. 5. Apply the SMR Oct-2025 Release 1 update or subsequent patches from Samsung as soon as they become available to remediate the vulnerability. 6. Conduct regular security audits and penetration testing focusing on local access controls and user interaction vectors. 7. Implement strong authentication and encryption on devices to protect sensitive data even if accessed improperly. 8. Establish incident response procedures for suspected local compromise involving mobile devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SamsungMobile
Date Reserved
2024-11-06T02:30:14.890Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e8ab797817465f6ff24921

Added to database: 10/10/2025, 6:45:13 AM

Last enriched: 10/10/2025, 6:46:53 AM

Last updated: 10/11/2025, 1:17:44 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats