Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21072: CWE-787 Out-of-bounds Write in Samsung Mobile Samsung Mobile Devices

0
Medium
VulnerabilityCVE-2025-21072cvecve-2025-21072cwe-787
Published: Tue Dec 02 2025 (12/02/2025, 01:23:05 UTC)
Source: CVE Database V5
Vendor/Project: Samsung Mobile
Product: Samsung Mobile Devices

Description

Out-of-bounds write in decoding metadata in fingerprint trustlet prior to SMR Dec-2025 Release 1 allows local privileged attackers to write out-of-bounds memory.

AI-Powered Analysis

AILast updated: 12/09/2025, 04:30:14 UTC

Technical Analysis

CVE-2025-21072 is an out-of-bounds write vulnerability classified under CWE-787 affecting Samsung Mobile devices' fingerprint trustlet prior to the SMR December 2025 Release 1 update. The flaw occurs during the decoding of metadata within the fingerprint trustlet, where a local attacker with elevated privileges can write data beyond the intended memory boundaries. This memory corruption can lead to unauthorized disclosure or modification of sensitive information, compromising confidentiality and integrity of the device's secure operations. The vulnerability requires the attacker to have high-level privileges on the device, such as root or system-level access, and does not require user interaction. The CVSS v3.1 base score is 5.7, reflecting medium severity, with attack vector local (AV:L), attack complexity high (AC:H), privileges required high (PR:H), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality and integrity (C:H/I:H/A:N). No public exploits have been reported yet, and no patches are linked at this time, indicating that mitigation relies on forthcoming security updates from Samsung. The vulnerability is significant because fingerprint trustlets handle sensitive biometric data and secure authentication processes, making exploitation a serious concern for device security and user privacy.

Potential Impact

For European organizations, the impact of CVE-2025-21072 could be substantial, especially for sectors relying heavily on mobile device security such as finance, government, healthcare, and critical infrastructure. Successful exploitation could allow attackers with local privileged access to manipulate or leak biometric data, undermining user authentication mechanisms and potentially enabling further lateral movement or privilege escalation within corporate networks. The confidentiality and integrity of sensitive information stored or processed on affected Samsung devices could be compromised. Although availability is not impacted, the breach of biometric trust could erode user confidence and lead to regulatory compliance issues under GDPR and other data protection laws. Organizations with mobile device management policies that permit local privileged access or insufficient endpoint security controls are at higher risk. The absence of known exploits currently reduces immediate risk but emphasizes the need for proactive mitigation before potential weaponization.

Mitigation Recommendations

1. Immediately restrict local privileged access on Samsung Mobile devices by enforcing strict endpoint security policies and limiting root or system-level permissions to trusted administrators only. 2. Monitor devices for unusual local privilege escalations or suspicious activity related to fingerprint trustlet processes. 3. Deploy mobile device management (MDM) solutions that can enforce security baselines and detect unauthorized modifications. 4. Apply the SMR December 2025 Release 1 update from Samsung as soon as it becomes available to patch the vulnerability. 5. Conduct regular audits of biometric authentication components and ensure secure coding practices are followed in custom applications interacting with fingerprint trustlets. 6. Educate users and administrators about the risks of granting elevated privileges and the importance of applying security updates promptly. 7. Consider additional endpoint protection tools that can detect memory corruption attempts locally. 8. Collaborate with Samsung support channels to receive timely vulnerability disclosures and patch notifications.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SamsungMobile
Date Reserved
2024-11-06T02:30:14.894Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692e499df2f793a7de785119

Added to database: 12/2/2025, 2:06:21 AM

Last enriched: 12/9/2025, 4:30:14 AM

Last updated: 1/19/2026, 8:05:09 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats