Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58478: CWE-787: Out-of-bounds Write in Samsung Mobile Samsung Mobile Devices

0
Medium
VulnerabilityCVE-2025-58478cvecve-2025-58478cwe-787
Published: Tue Dec 02 2025 (12/02/2025, 01:24:23 UTC)
Source: CVE Database V5
Vendor/Project: Samsung Mobile
Product: Samsung Mobile Devices

Description

Out-of-bounds write in libimagecodec.quram.so prior to SMR Dec-2025 Release 1 allows remote attackers to access out-of-bounds memory.

AI-Powered Analysis

AILast updated: 12/09/2025, 04:34:16 UTC

Technical Analysis

CVE-2025-58478 is an out-of-bounds write vulnerability classified under CWE-787 found in the libimagecodec.quram.so library component used in Samsung Mobile devices. This vulnerability allows remote attackers to write data beyond the allocated memory boundaries when processing certain image data, potentially corrupting memory and affecting the integrity of the device's operation. The flaw exists in versions prior to the Samsung Mobile Security Maintenance Release (SMR) December 2025 Release 1. The vulnerability can be triggered remotely without requiring any privileges, but it does require user interaction, such as opening a maliciously crafted image file. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the fact that while the attack vector is network-based and requires no privileges, the impact is limited to integrity with no direct confidentiality or availability impact. No known exploits have been reported in the wild as of the publication date. The vulnerability's root cause is improper bounds checking in the image codec library, which can lead to memory corruption and potentially unpredictable behavior or crashes. Samsung is expected to release patches in their December 2025 SMR update to address this issue. Until then, devices remain vulnerable if exposed to malicious image content.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to the integrity of Samsung Mobile devices used within their infrastructure. Potential impacts include unauthorized modification of memory leading to application crashes or corrupted data processing, which could disrupt business operations relying on mobile communications or applications. Although confidentiality and availability are not directly affected, integrity compromises could facilitate further exploitation or malware persistence if chained with other vulnerabilities. Organizations with employees or systems heavily reliant on Samsung Mobile devices for sensitive communications or operational tasks may face increased risk. The lack of known exploits reduces immediate threat, but the widespread use of Samsung devices in Europe means a large attack surface exists. Attackers could leverage social engineering to trick users into opening malicious images, making user awareness critical. The vulnerability could also impact mobile device management and security monitoring if exploited.

Mitigation Recommendations

European organizations should prioritize deploying the Samsung Mobile Security Maintenance Release (SMR) December 2025 update as soon as it becomes available to remediate the vulnerability. Until patching is possible, organizations should implement strict controls on the types of image files allowed on corporate devices, including filtering and scanning incoming images for malicious content. User training should emphasize the risks of opening unsolicited or suspicious image files, especially from untrusted sources. Mobile device management (MDM) solutions should enforce policies restricting installation of unverified applications that could deliver malicious images. Network-level protections such as intrusion detection systems (IDS) can be tuned to detect anomalous image processing behavior. Additionally, organizations should monitor for unusual device crashes or instability that might indicate exploitation attempts. Regular backups and integrity checks of critical mobile data can help mitigate potential damage from integrity violations. Collaboration with Samsung support channels for timely vulnerability intelligence and patch deployment is recommended.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SamsungMobile
Date Reserved
2025-09-03T06:13:48.468Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692e499df2f793a7de78512b

Added to database: 12/2/2025, 2:06:21 AM

Last enriched: 12/9/2025, 4:34:16 AM

Last updated: 1/19/2026, 8:04:56 AM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats