Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20990: CWE-926: Improper Export of Android Application Components in Samsung Mobile Samsung Mobile Devices

0
High
VulnerabilityCVE-2026-20990cvecve-2026-20990cwe-926
Published: Mon Mar 16 2026 (03/16/2026, 04:31:56 UTC)
Source: CVE Database V5
Vendor/Project: Samsung Mobile
Product: Samsung Mobile Devices

Description

Improper export of android application components in Secure Folder prior to SMR Mar-2026 Release 1 allows local attackers to launch arbitrary activity with Secure Folder privilege.

AI-Powered Analysis

AILast updated: 03/16/2026, 05:08:37 UTC

Technical Analysis

CVE-2026-20990 is a vulnerability classified under CWE-926 (Improper Export of Android Application Components) that affects Samsung Mobile devices' Secure Folder feature prior to the March 2026 SMR (Security Maintenance Release) 1 update. Secure Folder is a security feature designed to isolate sensitive applications and data within a protected environment on Samsung devices. The vulnerability arises because certain Android application components within Secure Folder are improperly exported, meaning they are accessible beyond their intended scope. This misconfiguration allows a local attacker, who already has limited privileges on the device, to launch arbitrary activities with Secure Folder privileges. Essentially, the attacker can execute actions or access data within Secure Folder that should be restricted, potentially bypassing security boundaries. The CVSS 4.0 vector indicates the attack requires local access (AV:L), low attack complexity (AC:L), no authentication (AT:N), and no user interaction (UI:N). The attacker must have limited privileges (PR:L), and the vulnerability impacts confidentiality, integrity, and availability to a high degree (VC:H, VI:H, VA:L). The scope is unchanged (SC:N), and no security requirements are altered (SI:N, SA:N). No known exploits have been reported in the wild, but the vulnerability is significant due to the sensitive nature of Secure Folder data and the ease of exploitation by local attackers. The vulnerability was reserved in December 2025 and published in March 2026, indicating a recent discovery and disclosure. Samsung Mobile devices prior to the SMR March 2026 Release 1 are affected, though specific affected versions are not detailed. This vulnerability highlights the risks of improper component export in Android applications, especially in security-critical features like Secure Folder.

Potential Impact

The impact of CVE-2026-20990 is substantial for organizations and individuals relying on Samsung Mobile devices with Secure Folder enabled. An attacker with local access and limited privileges can escalate their capabilities to execute arbitrary activities within Secure Folder, potentially accessing or manipulating sensitive corporate or personal data isolated in this secure environment. This undermines the confidentiality and integrity of data protected by Secure Folder, which is often used to store sensitive business documents, authentication credentials, or personal information. The vulnerability could facilitate lateral movement within a compromised device or enable data exfiltration from the secure environment. For enterprises deploying Samsung devices as part of their mobile device management (MDM) strategy, this vulnerability increases the risk of insider threats or malware that gains local access. Although exploitation requires local access, the widespread use of Samsung devices globally and the common practice of storing sensitive data in Secure Folder elevate the risk profile. The absence of known exploits in the wild suggests limited immediate threat, but the high CVSS score and ease of exploitation warrant urgent attention. Failure to address this vulnerability could lead to data breaches, compliance violations, and erosion of trust in mobile security controls.

Mitigation Recommendations

To mitigate CVE-2026-20990, organizations and users should prioritize updating Samsung Mobile devices to the SMR March 2026 Release 1 or later, as this patch addresses the improper export of Secure Folder components. Until patches are available, implement strict device access controls to prevent unauthorized local access, including strong lock screen authentication, biometric protections, and disabling USB debugging or developer options. Employ mobile device management (MDM) solutions to enforce security policies that restrict app installations and monitor device integrity. Limit physical access to devices, especially in high-risk environments. Review and audit Secure Folder configurations and permissions to ensure no unnecessary components are exported. Educate users about the risks of installing untrusted applications or granting excessive permissions that could facilitate local privilege escalation. Additionally, monitor device logs for suspicious activity indicative of attempts to exploit this vulnerability. For organizations, consider deploying endpoint detection and response (EDR) tools capable of detecting anomalous activity within mobile environments. Finally, maintain an incident response plan tailored to mobile device compromises to quickly contain and remediate any exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
SamsungMobile
Date Reserved
2025-12-11T01:33:35.800Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b78c339d4df4518315edfd

Added to database: 3/16/2026, 4:50:59 AM

Last enriched: 3/16/2026, 5:08:37 AM

Last updated: 3/16/2026, 9:25:27 PM

Views: 431

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses