Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21072: CWE-787 Out-of-bounds Write in Samsung Mobile Samsung Mobile Devices

0
Medium
VulnerabilityCVE-2025-21072cvecve-2025-21072cwe-787
Published: Tue Dec 02 2025 (12/02/2025, 01:23:05 UTC)
Source: CVE Database V5
Vendor/Project: Samsung Mobile
Product: Samsung Mobile Devices

Description

Out-of-bounds write in decoding metadata in fingerprint trustlet prior to SMR Dec-2025 Release 1 allows local privileged attackers to write out-of-bounds memory.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:54:34 UTC

Technical Analysis

CVE-2025-21072 is a vulnerability classified under CWE-787 (Out-of-bounds Write) affecting Samsung Mobile devices' fingerprint trustlet prior to the SMR Dec-2025 Release 1 update. The issue arises during the decoding of metadata within the fingerprint trustlet, where improper bounds checking allows a local attacker with elevated privileges to write data outside the intended memory buffer. This out-of-bounds write can corrupt memory, potentially leading to privilege escalation, unauthorized code execution, or data integrity compromise within the trusted execution environment managing fingerprint authentication. The vulnerability requires local privileged access (e.g., root or system-level permissions) and does not require user interaction, limiting remote exploitation but increasing risk from insider threats or malware with elevated rights. The CVSS v3.1 base score is 5.7, reflecting medium severity due to the high impact on confidentiality and integrity but limited attack vector (local) and high attack complexity. No public exploits are currently known, and no patch links have been published yet, indicating that mitigation depends on Samsung's forthcoming security maintenance release. The vulnerability affects a broad range of Samsung Mobile devices that utilize the vulnerable fingerprint trustlet firmware or software component prior to the December 2025 security update.

Potential Impact

The vulnerability poses a significant risk to the confidentiality and integrity of sensitive biometric data and authentication processes on affected Samsung Mobile devices. Successful exploitation could allow attackers with local privileged access to manipulate fingerprint authentication metadata, potentially bypassing security controls or escalating privileges within the device's trusted execution environment. This could lead to unauthorized access to user data, compromise of secure authentication mechanisms, and persistence of malicious code at a high privilege level. Although availability impact is not indicated, the corruption of memory could cause system instability or crashes. Organizations relying on Samsung Mobile devices for secure authentication, especially in sensitive environments, may face increased risk of insider threats or malware leveraging this vulnerability. The lack of remote exploitability limits the attack surface but does not eliminate risk in scenarios where attackers gain local privileged access through other means.

Mitigation Recommendations

1. Apply the official Samsung Mobile security update (SMR Dec-2025 Release 1) as soon as it becomes available to address the vulnerability in the fingerprint trustlet. 2. Restrict and monitor local privileged access on Samsung Mobile devices to prevent unauthorized users or applications from gaining the necessary privileges to exploit this flaw. 3. Employ mobile device management (MDM) solutions to enforce strict access controls and privilege separation on corporate devices. 4. Monitor system logs and fingerprint authentication components for anomalous behavior indicative of exploitation attempts. 5. Educate users and administrators about the risks of installing untrusted applications or rooting devices, which could facilitate privilege escalation. 6. Consider disabling fingerprint authentication temporarily in high-risk environments until the patch is applied, if operationally feasible. 7. Maintain up-to-date backups and incident response plans to quickly recover from potential compromise scenarios linked to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
SamsungMobile
Date Reserved
2024-11-06T02:30:14.894Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692e499df2f793a7de785119

Added to database: 12/2/2025, 2:06:21 AM

Last enriched: 2/27/2026, 4:54:34 AM

Last updated: 3/24/2026, 2:53:02 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses