Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20972: CWE-926 : Improper Export of Android Application Components in Samsung Mobile Samsung Mobile Devices

0
Medium
VulnerabilityCVE-2026-20972cvecve-2026-20972cwe-926
Published: Fri Jan 09 2026 (01/09/2026, 06:16:26 UTC)
Source: CVE Database V5
Vendor/Project: Samsung Mobile
Product: Samsung Mobile Devices

Description

Improper Export of Android Application Components in UwbTest prior to SMR Jan-2026 Release 1 allows local attackers to enable UWB.

AI-Powered Analysis

AILast updated: 01/09/2026, 06:42:21 UTC

Technical Analysis

CVE-2026-20972 is a vulnerability identified in Samsung Mobile devices related to the improper export of Android application components within the UwbTest application prior to the SMR (Security Maintenance Release) January 2026 Release 1. The root cause is classified under CWE-926, which pertains to improper export of components, allowing unauthorized access to application functionality. Specifically, this vulnerability permits local attackers with limited privileges (PR:L) to enable Ultra-Wideband (UWB) functionality on the device without requiring user interaction (UI:N) or network access (AV:L). UWB is a short-range wireless communication protocol used for precise location tracking and secure device-to-device communication. By exploiting this vulnerability, an attacker with local access could activate UWB capabilities, potentially bypassing intended security controls or privacy settings. The CVSS 4.0 base score is 4.8 (medium severity), reflecting the limited attack vector (local), low complexity, no need for user interaction, and limited privileges required. There are no known exploits in the wild, and no patches have been explicitly linked yet, though the vulnerability was reserved in December 2025 and published in January 2026. The lack of network or user interaction requirements increases the risk in environments where local access is possible, such as shared or multi-user devices. The vulnerability highlights the importance of correctly configuring Android application component exports to prevent unauthorized access to sensitive device features.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized enabling of UWB on Samsung mobile devices, potentially exposing sensitive location data or enabling covert communication channels. This could undermine confidentiality and privacy, especially in sectors handling sensitive or classified information. While the vulnerability requires local access, in environments where devices are shared, lost, or temporarily accessible by unauthorized personnel, the risk increases. The improper activation of UWB could also interfere with device integrity and availability if exploited to manipulate device behavior. Organizations relying heavily on Samsung mobile devices for secure communications or location-based services may face operational disruptions or data leakage risks. Although no remote exploitation is possible, insider threats or physical access scenarios are relevant. The medium severity rating suggests a moderate risk that should be addressed promptly to maintain device security posture.

Mitigation Recommendations

1. Restrict physical and local access to Samsung mobile devices, especially in sensitive environments, to prevent unauthorized users from exploiting the vulnerability. 2. Monitor UWB usage and device logs for unusual activation patterns that could indicate exploitation attempts. 3. Apply the SMR January 2026 Release 1 update or later as soon as it becomes available from Samsung to remediate the vulnerability. 4. Implement mobile device management (MDM) policies that limit or disable UWB functionality where not required. 5. Educate users about the risks of leaving devices unattended or lending them to untrusted individuals. 6. Conduct regular security audits on mobile devices to ensure application components are properly configured and not improperly exported. 7. For high-security environments, consider disabling UWB hardware via device settings or firmware controls if feasible until patches are applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SamsungMobile
Date Reserved
2025-12-11T01:33:35.798Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69609f9becefc3cd7c0ad504

Added to database: 1/9/2026, 6:26:35 AM

Last enriched: 1/9/2026, 6:42:21 AM

Last updated: 1/9/2026, 9:57:00 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats