Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58475: CWE-20: Improper Input Validation in Samsung Mobile Samsung Mobile Devices

0
Medium
VulnerabilityCVE-2025-58475cvecve-2025-58475cwe-20
Published: Tue Dec 02 2025 (12/02/2025, 01:24:19 UTC)
Source: CVE Database V5
Vendor/Project: Samsung Mobile
Product: Samsung Mobile Devices

Description

Improper input validation in libsec-ril.so prior to SMR Dec-2025 Release 1 allows local privileged attackers to write out-of-bounds memory.

AI-Powered Analysis

AILast updated: 12/09/2025, 04:33:36 UTC

Technical Analysis

CVE-2025-58475 is a vulnerability identified in Samsung Mobile devices, specifically within the libsec-ril.so library, which is part of the radio interface layer responsible for communication between the device's modem and the operating system. The vulnerability arises from improper input validation (CWE-20), allowing local privileged attackers to perform out-of-bounds memory writes. This type of memory corruption can lead to various consequences including unauthorized data disclosure (confidentiality impact), partial modification of data or code (integrity impact), and potential service disruption or device instability (availability impact). The flaw requires the attacker to have local high-level privileges on the device, meaning remote exploitation is not feasible without prior compromise. No user interaction is needed once local access is obtained. The vulnerability affects Samsung Mobile devices running firmware versions before the SMR Dec-2025 Release 1, which includes security patches addressing this issue. The CVSS v3.1 score is 5.6, reflecting medium severity, with attack vector local (AV:L), low attack complexity (AC:L), high privileges required (PR:H), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), low integrity impact (I:L), and low availability impact (A:L). No public exploits are known, but the vulnerability could be leveraged in targeted attacks where an adversary has gained privileged local access, such as through malicious apps or insider threats.

Potential Impact

For European organizations, the vulnerability poses a moderate risk primarily in environments where Samsung Mobile devices are used for sensitive communications or data handling. The ability to write out-of-bounds memory locally could enable attackers to escalate privileges further, exfiltrate sensitive information, or cause device instability, impacting business continuity. Sectors such as finance, government, and critical infrastructure that rely heavily on mobile device security could face confidentiality breaches or operational disruptions. The requirement for local privileged access limits the attack surface, but insider threats or malware that gains elevated privileges could exploit this flaw. Additionally, the widespread use of Samsung devices in Europe means that the vulnerability could have broad implications if exploited at scale or combined with other attack vectors.

Mitigation Recommendations

Organizations should prioritize updating Samsung Mobile devices to the SMR Dec-2025 Release 1 or later, which contains patches addressing this vulnerability. Implement strict access controls to limit local privileged access on mobile devices, including enforcing least privilege principles and monitoring for unauthorized privilege escalations. Employ mobile device management (MDM) solutions to enforce security policies and ensure timely patch deployment. Conduct regular audits of installed applications to detect potentially malicious software that could attempt to exploit local vulnerabilities. Additionally, educate users about the risks of installing untrusted applications and the importance of device security hygiene. For high-risk environments, consider additional endpoint protection solutions that can detect anomalous memory operations or privilege escalations on mobile devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SamsungMobile
Date Reserved
2025-09-03T06:13:48.467Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692e499df2f793a7de785122

Added to database: 12/2/2025, 2:06:21 AM

Last enriched: 12/9/2025, 4:33:36 AM

Last updated: 1/19/2026, 7:55:33 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats