Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58477: CWE-787: Out-of-bounds Write in Samsung Mobile Samsung Mobile Devices

0
Medium
VulnerabilityCVE-2025-58477cvecve-2025-58477cwe-787
Published: Tue Dec 02 2025 (12/02/2025, 01:24:22 UTC)
Source: CVE Database V5
Vendor/Project: Samsung Mobile
Product: Samsung Mobile Devices

Description

Out-of-bounds write in parsing IFD tag in libimagecodec.quram.so prior to SMR Dec-2025 Release 1 allows remote attackers to access out-of-bounds memory.

AI-Powered Analysis

AILast updated: 12/09/2025, 04:34:06 UTC

Technical Analysis

CVE-2025-58477 is an out-of-bounds write vulnerability classified under CWE-787 found in the libimagecodec.quram.so library used by Samsung Mobile devices. The flaw occurs during the parsing of Image File Directory (IFD) tags, which are part of image metadata structures. Specifically, the vulnerability allows remote attackers to write data beyond the allocated memory buffer boundaries when processing crafted image files. This can lead to memory corruption, potentially altering program behavior or causing crashes. The vulnerability does not directly compromise confidentiality or availability but impacts integrity by enabling unauthorized memory modification. Exploitation requires no privileges and no authentication but does require user interaction, such as opening or previewing a maliciously crafted image file. The vulnerability affects devices prior to the Samsung Mobile Security Release (SMR) December 2025 Release 1, with no patches publicly available at the time of disclosure. No known exploits have been reported in the wild, indicating limited active exploitation. The CVSS v3.1 base score is 4.3, reflecting a medium severity level due to the ease of remote exploitation balanced against limited impact scope. The vulnerability highlights the risks associated with image parsing libraries and the importance of robust input validation in mobile device firmware components.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to mobile device integrity. Samsung Mobile devices are widely used across Europe in both consumer and enterprise environments, including sectors reliant on mobile communications such as finance, healthcare, and government. Successful exploitation could allow attackers to corrupt memory, potentially leading to application crashes or unexpected behavior that might be leveraged in targeted attacks or to bypass security controls. While no direct confidentiality or availability impact is indicated, integrity compromises could facilitate further exploitation chains or data manipulation. The requirement for user interaction limits mass exploitation but does not eliminate risk from phishing or social engineering campaigns delivering malicious images. Organizations with mobile device management (MDM) systems controlling Samsung devices may face operational challenges if devices become unstable or compromised. The lack of current patches necessitates heightened vigilance until updates are deployed.

Mitigation Recommendations

European organizations should prioritize the following mitigations: 1) Monitor Samsung’s official security advisories and apply the SMR December 2025 Release 1 update or later as soon as it becomes available to remediate the vulnerability. 2) Implement strict controls on image file sources, restricting or scanning images received via email, messaging apps, or downloads to detect potentially malicious content. 3) Educate users about the risks of opening untrusted image files, emphasizing caution with unsolicited images or those from unknown sources. 4) Utilize mobile device management (MDM) solutions to enforce security policies, including restricting installation of apps that can process images from unverified sources. 5) Employ endpoint detection and response (EDR) tools capable of identifying anomalous application crashes or memory corruption events on mobile devices. 6) Consider network-level protections such as sandboxing or content disarm and reconstruction (CDR) for image files entering corporate environments. These targeted actions go beyond generic advice by focusing on controlling the attack vector (malicious images) and ensuring timely patch deployment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SamsungMobile
Date Reserved
2025-09-03T06:13:48.467Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692e499df2f793a7de785128

Added to database: 12/2/2025, 2:06:21 AM

Last enriched: 12/9/2025, 4:34:06 AM

Last updated: 1/18/2026, 3:58:42 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats