Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21080: CWE-926: Improper Export of Android Application Components in Samsung Mobile Samsung Mobile Devices

0
Medium
VulnerabilityCVE-2025-21080cvecve-2025-21080cwe-926
Published: Tue Dec 02 2025 (12/02/2025, 01:23:31 UTC)
Source: CVE Database V5
Vendor/Project: Samsung Mobile
Product: Samsung Mobile Devices

Description

Improper export of android application components in Dynamic Lockscreen prior to SMR Dec-2025 Release 1 allows local attackers to access files with Dynamic Lockscreen's privilege.

AI-Powered Analysis

AILast updated: 12/09/2025, 04:33:14 UTC

Technical Analysis

CVE-2025-21080 is a vulnerability classified under CWE-926 (Improper Export of Android Application Components) found in Samsung Mobile devices specifically within the Dynamic Lockscreen application prior to the SMR (Security Maintenance Release) December 2025 Release 1. The flaw arises because certain Android application components are improperly exported, allowing local attackers to access files and resources with the privileges assigned to the Dynamic Lockscreen app. This improper export means that components intended to be private or restricted are accessible to other local applications or users without proper permission checks. The vulnerability has a CVSS v3.1 base score of 6.2, reflecting medium severity. The attack vector is local (AV:L), requiring the attacker to have physical or local access to the device. No privileges are required (PR:N), no user interaction is needed (UI:N), and the scope is unchanged (S:U). The impact affects integrity (I:H) but not confidentiality or availability. This means an attacker can modify or corrupt data accessible by the Dynamic Lockscreen app but cannot read sensitive information or disrupt device availability. No known exploits have been reported in the wild, and no patches are linked yet, though the issue is expected to be resolved in the December 2025 SMR update. The vulnerability was reserved in November 2024 and published in December 2025 by SamsungMobile. The improper export of components is a common Android security issue where exported activities, services, or content providers are accessible beyond intended boundaries, leading to privilege escalation or unauthorized access. In this case, the Dynamic Lockscreen app’s files are exposed, potentially allowing local attackers to manipulate lockscreen behavior or related data.

Potential Impact

For European organizations, the impact of CVE-2025-21080 is primarily on the integrity of data managed by the Dynamic Lockscreen application on Samsung Mobile devices. While confidentiality and availability are not directly affected, unauthorized modification of lockscreen data or related files could lead to bypassing security controls or altering user experience, potentially facilitating further attacks or unauthorized access. Organizations relying on Samsung Mobile devices for secure communications or mobile workforce management could face risks if attackers gain local access to devices, such as through theft or insider threats. The medium severity score reflects that exploitation requires local access and does not compromise confidentiality, but the integrity impact could undermine trust in device security. In sectors like finance, government, and critical infrastructure where mobile device security is paramount, this vulnerability could be leveraged as part of a multi-stage attack. The absence of known exploits reduces immediate risk but does not eliminate the need for timely remediation. The vulnerability also highlights the importance of secure application component configuration in mobile device management strategies.

Mitigation Recommendations

1. Apply the Samsung Mobile Security Maintenance Release (SMR) December 2025 Release 1 or later as soon as it becomes available, as this update is expected to fix the improper export issue. 2. Until patching is possible, restrict physical and local access to Samsung Mobile devices, enforcing strict device control policies to prevent unauthorized local exploitation. 3. Utilize Mobile Device Management (MDM) solutions to monitor and control application permissions and exported components where possible. 4. Conduct audits of installed applications on Samsung devices to identify any suspicious or unnecessary exported components. 5. Educate users about the risks of local device access and encourage strong device locking mechanisms (PIN, biometrics) to reduce the likelihood of local attacker access. 6. Implement endpoint detection and response (EDR) tools capable of detecting anomalous local activity on mobile devices. 7. Collaborate with Samsung support channels to receive timely updates and advisories related to this vulnerability. 8. For sensitive environments, consider temporary restrictions on the use of affected Samsung devices until patches are applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SamsungMobile
Date Reserved
2024-11-06T02:30:14.896Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692e499df2f793a7de78511c

Added to database: 12/2/2025, 2:06:21 AM

Last enriched: 12/9/2025, 4:33:14 AM

Last updated: 1/19/2026, 12:02:10 PM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats