Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21062: CWE-327 Use of a Broken or Risky Cryptographic Algorithm in Samsung Mobile Smart Switch

0
High
VulnerabilityCVE-2025-21062cvecve-2025-21062cwe-327
Published: Fri Oct 10 2025 (10/10/2025, 06:33:20 UTC)
Source: CVE Database V5
Vendor/Project: Samsung Mobile
Product: Smart Switch

Description

Use of a broken or risky cryptographic algorithm in Smart Switch prior to version 3.7.67.2 allows local attackers to replace the restoring application. User interaction is required for triggering this vulnerability.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 00:43:12 UTC

Technical Analysis

CVE-2025-21062 is a vulnerability identified in Samsung Mobile's Smart Switch application, a tool widely used for data transfer and device restoration on Samsung smartphones. The root cause is the use of a broken or risky cryptographic algorithm (classified under CWE-327), which undermines the security guarantees of the application. This cryptographic weakness allows a local attacker—someone with physical or local access to the device—to replace the restoring application component. The attack requires user interaction, meaning the victim must perform some action to trigger the exploit, but no prior privileges or authentication are necessary. The vulnerability affects versions of Smart Switch prior to 3.7.67.2, although specific affected versions were not enumerated. The CVSS v3.1 base score is 7.8, indicating a high severity level, with the vector AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. This means the attack vector is local, attack complexity is low, no privileges are required, user interaction is required, and the impact on confidentiality, integrity, and availability is high. The cryptographic flaw could allow attackers to manipulate the restoration process, potentially leading to unauthorized data access, data tampering, or denial of service by replacing critical application components. No public exploits are known at this time, but the vulnerability's nature suggests a significant risk if exploited. The vulnerability was reserved in November 2024 and published in October 2025, indicating a recent disclosure. Samsung users should be vigilant and update the Smart Switch application promptly once patches are available.

Potential Impact

The vulnerability poses a significant risk to the confidentiality, integrity, and availability of data on Samsung devices using the affected Smart Switch versions. An attacker with local access can replace the restoring application, potentially injecting malicious code or altering data during device restoration. This could lead to unauthorized data disclosure, permanent data corruption, or denial of service by preventing successful device restoration. Organizations relying on Samsung devices for critical operations, especially those using Smart Switch for backup and restoration, may face operational disruptions and data breaches. The requirement for user interaction limits remote exploitation but does not eliminate risk, particularly in environments where devices are shared, lost, or physically accessible by attackers. The absence of known exploits in the wild reduces immediate threat but does not preclude future attacks. The vulnerability could be leveraged in targeted attacks against high-value individuals or organizations, especially where device restoration is part of incident response or device replacement workflows.

Mitigation Recommendations

To mitigate this vulnerability, organizations and users should: 1) Update the Samsung Smart Switch application to version 3.7.67.2 or later as soon as the patch is available from Samsung, ensuring the cryptographic algorithm is replaced with a secure alternative. 2) Restrict physical and local access to devices, especially in sensitive environments, to prevent unauthorized local attackers from exploiting the vulnerability. 3) Educate users to avoid interacting with suspicious prompts or restoration processes that could trigger the exploit. 4) Implement device management policies that monitor and control application versions and enforce timely updates. 5) Use endpoint security solutions that can detect unauthorized modifications to applications or restoration processes. 6) For organizations, consider additional encryption and backup strategies independent of Smart Switch to reduce reliance on a single restoration tool. 7) Monitor security advisories from Samsung and cybersecurity communities for updates or exploit disclosures related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
SamsungMobile
Date Reserved
2024-11-06T02:30:14.892Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e8ab7a7817465f6ff2494c

Added to database: 10/10/2025, 6:45:14 AM

Last enriched: 2/27/2026, 12:43:12 AM

Last updated: 3/25/2026, 3:10:59 AM

Views: 116

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses