Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58481: CWE-284 Improper Access Control in Samsung Mobile MotionPhoto

0
High
VulnerabilityCVE-2025-58481cvecve-2025-58481cwe-284
Published: Tue Dec 02 2025 (12/02/2025, 01:24:26 UTC)
Source: CVE Database V5
Vendor/Project: Samsung Mobile
Product: MotionPhoto

Description

Improper access control in MPRemoteService of MotionPhoto prior to version 4.1.51 allows local attackers to start privileged service.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:41:05 UTC

Technical Analysis

CVE-2025-58481 is a vulnerability classified under CWE-284 (Improper Access Control) affecting the MPRemoteService component of Samsung Mobile's MotionPhoto application prior to version 4.1.51. The flaw allows a local attacker with limited privileges (PR:L) to start a privileged service, bypassing intended access restrictions. The vulnerability requires local access and some user interaction (UI:R) but does not require elevated privileges initially. The scope is unchanged (S:U), meaning the impact is confined to the vulnerable component on the same device. The CVSS 3.1 base score is 7.3, indicating a high severity level due to the potential for full compromise of confidentiality, integrity, and availability (C:H/I:H/A:H). This could allow attackers to execute privileged operations, potentially leading to unauthorized data access, modification, or denial of service. The vulnerability is specific to Samsung Mobile devices running MotionPhoto software versions before 4.1.51. No public exploits have been reported yet, but the ease of exploitation combined with the high impact makes it a critical concern for affected users. The vulnerability was reserved in early September 2025 and published in December 2025, with no patch links currently available, indicating that remediation may still be pending or in progress.

Potential Impact

The vulnerability poses a significant risk to organizations and individuals using Samsung Mobile devices with the affected MotionPhoto versions. Successful exploitation can lead to unauthorized activation of privileged services, potentially allowing attackers to escalate privileges, access sensitive data, manipulate device functions, or disrupt normal operations. This can compromise user privacy, lead to data breaches, and impact device availability. For enterprises relying on Samsung mobile devices for communication, data storage, or operational tasks, this vulnerability could be leveraged for lateral movement or persistence within internal networks if attackers gain physical or local access. The requirement for local access and user interaction limits remote exploitation but does not eliminate risk in environments where devices may be physically accessible or where social engineering can induce user interaction. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity score underscores the urgency for patching and access control hardening.

Mitigation Recommendations

Organizations and users should immediately verify the version of MotionPhoto installed on Samsung devices and upgrade to version 4.1.51 or later once the patch is released. Until a patch is available, enforce strict local access controls to prevent unauthorized users from gaining physical or local access to devices. Implement device-level security measures such as strong authentication, screen locks, and disabling unnecessary local services. Educate users about the risks of interacting with unknown prompts or applications that could trigger the vulnerable service. Monitor devices for unusual activity indicative of privilege escalation attempts. For enterprise environments, consider mobile device management (MDM) solutions to enforce security policies and remotely manage device configurations. Regularly review and update security policies related to mobile device usage and physical security to reduce exposure to local attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
SamsungMobile
Date Reserved
2025-09-03T06:13:48.468Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692e499df2f793a7de785134

Added to database: 12/2/2025, 2:06:21 AM

Last enriched: 2/27/2026, 5:41:05 AM

Last updated: 3/25/2026, 7:19:27 AM

Views: 92

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses