Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21061: CWE-312 Cleartext Storage of Sensitive Information in Samsung Mobile Smart Switch

0
High
VulnerabilityCVE-2025-21061cvecve-2025-21061cwe-312
Published: Fri Oct 10 2025 (10/10/2025, 06:33:19 UTC)
Source: CVE Database V5
Vendor/Project: Samsung Mobile
Product: Smart Switch

Description

Cleartext storage of sensitive information in Smart Switch prior to version 3.7.67.2 allows local attackers to access sensitive data. User interaction is required for triggering this vulnerability.

AI-Powered Analysis

AILast updated: 10/10/2025, 06:49:28 UTC

Technical Analysis

CVE-2025-21061 is a vulnerability classified under CWE-312, indicating cleartext storage of sensitive information within Samsung Mobile's Smart Switch application versions prior to 3.7.67.2. Smart Switch is widely used for transferring data between Samsung devices and backing up mobile data. The vulnerability arises because sensitive data—potentially including credentials, personal information, or configuration details—is stored on the device without encryption, making it accessible to any local attacker with access to the device's file system. The attack vector is local (AV:L), requiring the attacker to have physical or logical access to the device but no privileges (PR:N). User interaction (UI:R) is necessary to trigger the vulnerability, such as running the application or initiating a data transfer. The vulnerability impacts confidentiality (C:H) and availability (A:H) but not integrity (I:N), meaning sensitive data can be disclosed and potentially cause denial of service or data loss scenarios. The CVSS 3.1 score of 7.1 reflects a high severity due to the combination of high confidentiality and availability impacts and low attack complexity. No known exploits have been reported in the wild, but the vulnerability poses a significant risk especially in environments where devices are shared or physically accessible by unauthorized persons. The lack of a patch link suggests that users must upgrade to version 3.7.67.2 or later once available to remediate the issue.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive corporate or personal data stored on Samsung devices using Smart Switch. This is particularly critical for sectors handling sensitive information such as finance, healthcare, and government. The local nature of the attack means that physical device security is paramount; however, insider threats or theft could exploit this vulnerability to extract confidential data. The impact on availability could disrupt device backup and restore operations, affecting business continuity. Given the widespread use of Samsung devices in Europe, especially in countries with high mobile penetration and mobile workforce reliance, this vulnerability could expose a large number of endpoints to data leakage and operational disruption. Organizations with Bring Your Own Device (BYOD) policies or mobile device management (MDM) solutions integrating Smart Switch functionality are at increased risk. The absence of known exploits reduces immediate risk but should not lead to complacency.

Mitigation Recommendations

Organizations should prioritize updating Samsung Smart Switch to version 3.7.67.2 or later as soon as it becomes available to eliminate the cleartext storage issue. Until the update is applied, restrict physical and logical access to devices running vulnerable versions, enforcing strict device usage policies and endpoint security controls. Employ mobile device management (MDM) solutions to monitor and control application versions and permissions. Educate users about the risks of running outdated Smart Switch versions and the importance of not sharing devices or leaving them unattended. Additionally, implement encryption at the device storage level (e.g., full disk encryption) to reduce the risk of data exposure from local access. Regularly audit devices for unauthorized data access and consider disabling Smart Switch on devices where it is not essential. Finally, monitor Samsung's security advisories for patches and further guidance.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SamsungMobile
Date Reserved
2024-11-06T02:30:14.892Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e8ab7a7817465f6ff24949

Added to database: 10/10/2025, 6:45:14 AM

Last enriched: 10/10/2025, 6:49:28 AM

Last updated: 10/10/2025, 9:17:00 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats