Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58482: CWE-284 Improper Access Control in Samsung Mobile MotionPhoto

0
High
VulnerabilityCVE-2025-58482cvecve-2025-58482cwe-284
Published: Tue Dec 02 2025 (12/02/2025, 01:24:28 UTC)
Source: CVE Database V5
Vendor/Project: Samsung Mobile
Product: MotionPhoto

Description

Improper access control in MPLocalService of MotionPhoto prior to version 4.1.51 allows local attackers to start privileged service.

AI-Powered Analysis

AILast updated: 12/02/2025, 02:21:20 UTC

Technical Analysis

CVE-2025-58482 is a vulnerability classified under CWE-284 (Improper Access Control) found in the MPLocalService component of Samsung Mobile's MotionPhoto application. This flaw exists in versions prior to 4.1.51 and allows a local attacker with limited privileges to start a privileged service that should normally be restricted. The vulnerability arises because the access control mechanisms governing the initiation of this service are insufficient, enabling privilege escalation on the device. The CVSS v3.1 score of 7.3 reflects a high severity, with attack vector being local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), and some user interaction (UI:R). The impact is severe, affecting confidentiality, integrity, and availability (all rated high). Although no exploits are known in the wild yet, the vulnerability could be leveraged by malicious insiders or malware that gains local access to escalate privileges and compromise the device fully. The MotionPhoto app is used to capture and manage motion photos on Samsung mobile devices, making this vulnerability relevant to a wide user base. The lack of patch links suggests the fix is either pending or not publicly disclosed yet, emphasizing the need for vigilance and interim mitigations.

Potential Impact

For European organizations, this vulnerability poses a significant risk to mobile device security, especially for employees using Samsung smartphones for corporate communications and data access. Successful exploitation could allow attackers to gain elevated privileges on the device, potentially leading to unauthorized access to sensitive corporate data, interception or manipulation of communications, installation of persistent malware, and disruption of device functionality. This could result in data breaches, loss of intellectual property, and operational downtime. The local attack vector means physical or logical access to the device is required, which could be exploited in scenarios involving lost or stolen devices, or through malware that has already compromised user-level access. Given the widespread use of Samsung devices in Europe, particularly in business environments, the vulnerability could have broad implications if not addressed promptly.

Mitigation Recommendations

1. Immediately monitor for updates from Samsung and apply the patch for MotionPhoto version 4.1.51 or later as soon as it becomes available. 2. Restrict physical and logical access to corporate mobile devices to trusted personnel only. 3. Employ mobile device management (MDM) solutions to enforce security policies, including app version control and privilege restrictions. 4. Educate users about the risks of installing untrusted applications or clicking on suspicious links that could lead to local compromise. 5. Implement endpoint detection and response (EDR) tools on mobile devices to detect unusual privilege escalation attempts. 6. Temporarily disable or restrict the use of the MotionPhoto app on corporate devices if patching is delayed and the app is not essential. 7. Regularly audit device configurations and installed applications to identify vulnerable versions and unauthorized changes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
SamsungMobile
Date Reserved
2025-09-03T06:13:48.468Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692e499ef2f793a7de785141

Added to database: 12/2/2025, 2:06:22 AM

Last enriched: 12/2/2025, 2:21:20 AM

Last updated: 12/2/2025, 10:01:03 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats