CVE-2026-20972: CWE-926 : Improper Export of Android Application Components in Samsung Mobile Samsung Mobile Devices
Improper Export of Android Application Components in UwbTest prior to SMR Jan-2026 Release 1 allows local attackers to enable UWB.
AI Analysis
Technical Summary
CVE-2026-20972 is a vulnerability identified in Samsung Mobile devices related to the improper export of Android application components within the UwbTest application prior to the SMR (Security Maintenance Release) January 2026 Release 1. The root cause is classified under CWE-926, which pertains to improper export of components, allowing unauthorized access to application functionality. Specifically, this vulnerability permits local attackers with limited privileges (PR:L) to enable Ultra-Wideband (UWB) functionality on the device without requiring user interaction (UI:N) or network access (AV:L). UWB is a short-range wireless communication protocol used for precise location tracking and secure device-to-device communication. By exploiting this vulnerability, an attacker with local access could activate UWB capabilities, potentially bypassing intended security controls or privacy settings. The CVSS 4.0 base score is 4.8 (medium severity), reflecting the limited attack vector (local), low complexity, no need for user interaction, and limited privileges required. There are no known exploits in the wild, and no patches have been explicitly linked yet, though the vulnerability was reserved in December 2025 and published in January 2026. The lack of network or user interaction requirements increases the risk in environments where local access is possible, such as shared or multi-user devices. The vulnerability highlights the importance of correctly configuring Android application component exports to prevent unauthorized access to sensitive device features.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized enabling of UWB on Samsung mobile devices, potentially exposing sensitive location data or enabling covert communication channels. This could undermine confidentiality and privacy, especially in sectors handling sensitive or classified information. While the vulnerability requires local access, in environments where devices are shared, lost, or temporarily accessible by unauthorized personnel, the risk increases. The improper activation of UWB could also interfere with device integrity and availability if exploited to manipulate device behavior. Organizations relying heavily on Samsung mobile devices for secure communications or location-based services may face operational disruptions or data leakage risks. Although no remote exploitation is possible, insider threats or physical access scenarios are relevant. The medium severity rating suggests a moderate risk that should be addressed promptly to maintain device security posture.
Mitigation Recommendations
1. Restrict physical and local access to Samsung mobile devices, especially in sensitive environments, to prevent unauthorized users from exploiting the vulnerability. 2. Monitor UWB usage and device logs for unusual activation patterns that could indicate exploitation attempts. 3. Apply the SMR January 2026 Release 1 update or later as soon as it becomes available from Samsung to remediate the vulnerability. 4. Implement mobile device management (MDM) policies that limit or disable UWB functionality where not required. 5. Educate users about the risks of leaving devices unattended or lending them to untrusted individuals. 6. Conduct regular security audits on mobile devices to ensure application components are properly configured and not improperly exported. 7. For high-security environments, consider disabling UWB hardware via device settings or firmware controls if feasible until patches are applied.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden
CVE-2026-20972: CWE-926 : Improper Export of Android Application Components in Samsung Mobile Samsung Mobile Devices
Description
Improper Export of Android Application Components in UwbTest prior to SMR Jan-2026 Release 1 allows local attackers to enable UWB.
AI-Powered Analysis
Technical Analysis
CVE-2026-20972 is a vulnerability identified in Samsung Mobile devices related to the improper export of Android application components within the UwbTest application prior to the SMR (Security Maintenance Release) January 2026 Release 1. The root cause is classified under CWE-926, which pertains to improper export of components, allowing unauthorized access to application functionality. Specifically, this vulnerability permits local attackers with limited privileges (PR:L) to enable Ultra-Wideband (UWB) functionality on the device without requiring user interaction (UI:N) or network access (AV:L). UWB is a short-range wireless communication protocol used for precise location tracking and secure device-to-device communication. By exploiting this vulnerability, an attacker with local access could activate UWB capabilities, potentially bypassing intended security controls or privacy settings. The CVSS 4.0 base score is 4.8 (medium severity), reflecting the limited attack vector (local), low complexity, no need for user interaction, and limited privileges required. There are no known exploits in the wild, and no patches have been explicitly linked yet, though the vulnerability was reserved in December 2025 and published in January 2026. The lack of network or user interaction requirements increases the risk in environments where local access is possible, such as shared or multi-user devices. The vulnerability highlights the importance of correctly configuring Android application component exports to prevent unauthorized access to sensitive device features.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized enabling of UWB on Samsung mobile devices, potentially exposing sensitive location data or enabling covert communication channels. This could undermine confidentiality and privacy, especially in sectors handling sensitive or classified information. While the vulnerability requires local access, in environments where devices are shared, lost, or temporarily accessible by unauthorized personnel, the risk increases. The improper activation of UWB could also interfere with device integrity and availability if exploited to manipulate device behavior. Organizations relying heavily on Samsung mobile devices for secure communications or location-based services may face operational disruptions or data leakage risks. Although no remote exploitation is possible, insider threats or physical access scenarios are relevant. The medium severity rating suggests a moderate risk that should be addressed promptly to maintain device security posture.
Mitigation Recommendations
1. Restrict physical and local access to Samsung mobile devices, especially in sensitive environments, to prevent unauthorized users from exploiting the vulnerability. 2. Monitor UWB usage and device logs for unusual activation patterns that could indicate exploitation attempts. 3. Apply the SMR January 2026 Release 1 update or later as soon as it becomes available from Samsung to remediate the vulnerability. 4. Implement mobile device management (MDM) policies that limit or disable UWB functionality where not required. 5. Educate users about the risks of leaving devices unattended or lending them to untrusted individuals. 6. Conduct regular security audits on mobile devices to ensure application components are properly configured and not improperly exported. 7. For high-security environments, consider disabling UWB hardware via device settings or firmware controls if feasible until patches are applied.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- SamsungMobile
- Date Reserved
- 2025-12-11T01:33:35.798Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69609f9becefc3cd7c0ad504
Added to database: 1/9/2026, 6:26:35 AM
Last enriched: 1/9/2026, 6:42:21 AM
Last updated: 1/9/2026, 9:57:00 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62487: The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions. in Palantir com.palantir.acme:gotham-default-apps-bundle
LowCVE-2025-46299: Processing maliciously crafted web content may disclose internal states of the app in Apple tvOS
MediumCVE-2025-46298: Processing maliciously crafted web content may lead to an unexpected process crash in Apple tvOS
MediumCVE-2025-46297: An app may be able to access protected files within an App Sandbox container in Apple macOS
HighCVE-2025-46286: Restoring from a backup may prevent passcode from being required immediately after Face ID enrollment in Apple iOS and iPadOS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.