Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58482: CWE-284 Improper Access Control in Samsung Mobile MotionPhoto

0
High
VulnerabilityCVE-2025-58482cvecve-2025-58482cwe-284
Published: Tue Dec 02 2025 (12/02/2025, 01:24:28 UTC)
Source: CVE Database V5
Vendor/Project: Samsung Mobile
Product: MotionPhoto

Description

Improper access control in MPLocalService of MotionPhoto prior to version 4.1.51 allows local attackers to start privileged service.

AI-Powered Analysis

AILast updated: 12/09/2025, 04:30:46 UTC

Technical Analysis

CVE-2025-58482 is an improper access control vulnerability classified under CWE-284, affecting the MPLocalService component of Samsung Mobile's MotionPhoto application prior to version 4.1.51. The flaw allows a local attacker with limited privileges to initiate a privileged service without proper authorization checks. This escalation can lead to a compromise of confidentiality, integrity, and availability of the device and its data. The vulnerability is local vector (AV:L), requires low attack complexity (AC:L), and low privileges (PR:L), but does require user interaction (UI:R). The scope remains unchanged (S:U), meaning the impact is confined to the vulnerable component or device. The CVSS v3.1 base score is 7.3, indicating a high severity. Although no public exploits are currently known, the potential for privilege escalation and full device compromise is significant. The vulnerability likely stems from insufficient validation of requests to the MPLocalService, allowing unauthorized service start commands. This could enable attackers to execute privileged operations, access sensitive user data, or disrupt device functionality. Samsung has reserved the CVE and published the advisory but has not yet released a patch or detailed mitigation guidance beyond version updates. The vulnerability primarily affects Samsung mobile devices running the MotionPhoto app with versions before 4.1.51, which is common in many consumer and enterprise environments.

Potential Impact

For European organizations, this vulnerability presents a substantial risk, especially for those with employees or operations relying on Samsung mobile devices. The ability for a local attacker to escalate privileges and start privileged services can lead to unauthorized access to sensitive corporate data, interception of communications, or disruption of mobile device availability. This is particularly critical for sectors handling sensitive information such as finance, government, healthcare, and critical infrastructure. The local attack vector means physical access or malware with local execution capability is required, which could be facilitated by social engineering or insider threats. The high confidentiality, integrity, and availability impact could result in data breaches, loss of trust, regulatory penalties under GDPR, and operational disruptions. Given the widespread use of Samsung devices in Europe, the threat surface is significant. Organizations with Bring Your Own Device (BYOD) policies or mobile workforce are especially vulnerable if devices are not updated promptly.

Mitigation Recommendations

The primary mitigation is to update the MotionPhoto application to version 4.1.51 or later, where the vulnerability has been addressed. Organizations should enforce mobile device management (MDM) policies that mandate timely updates of applications and operating systems. Restricting local access to devices through strong physical security controls and endpoint protection can reduce the risk of exploitation. Employing application whitelisting and monitoring for unusual service start requests on devices can help detect exploitation attempts. User training to recognize phishing or social engineering attempts that could lead to local code execution is also critical. For high-security environments, consider disabling or limiting the use of the MotionPhoto app if updates cannot be applied immediately. Regular audits of device security posture and incident response readiness for mobile threats will further reduce impact.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SamsungMobile
Date Reserved
2025-09-03T06:13:48.468Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692e499ef2f793a7de785141

Added to database: 12/2/2025, 2:06:22 AM

Last enriched: 12/9/2025, 4:30:46 AM

Last updated: 1/16/2026, 11:40:11 PM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats