Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21000: CWE-284: Improper Access Control in Samsung Mobile Galaxy Store

0
High
VulnerabilityCVE-2026-21000cvecve-2026-21000cwe-284
Published: Mon Mar 16 2026 (03/16/2026, 04:32:08 UTC)
Source: CVE Database V5
Vendor/Project: Samsung Mobile
Product: Galaxy Store

Description

Improper access control in Galaxy Store prior to version 4.6.03.8 allows local attacker to create file with Galaxy Store privilege.

AI-Powered Analysis

AILast updated: 03/16/2026, 05:05:54 UTC

Technical Analysis

CVE-2026-21000 is an improper access control vulnerability classified under CWE-284 affecting Samsung Mobile's Galaxy Store application prior to version 4.6.03.8. The flaw allows a local attacker to create files with the privileges of the Galaxy Store application, which typically runs with elevated permissions on Samsung devices. This vulnerability arises because the Galaxy Store does not adequately enforce access controls on file creation operations, enabling unauthorized local users to write files that could be used to execute arbitrary code or manipulate the application’s behavior. The vulnerability has a CVSS 4.0 base score of 7.0, indicating high severity, with an attack vector limited to local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality is none, but integrity is high and availability is low, meaning attackers can alter data or application behavior but not directly disrupt service or access confidential data. No known exploits have been reported in the wild yet. The vulnerability was reserved in December 2025 and published in March 2026. The lack of authentication and user interaction requirements combined with the ability to escalate privileges locally makes this a significant risk for Samsung device users running vulnerable Galaxy Store versions.

Potential Impact

The primary impact of CVE-2026-21000 is the potential for local privilege escalation on Samsung devices using vulnerable versions of the Galaxy Store. An attacker with local access could create or modify files with the Galaxy Store's privileges, potentially leading to unauthorized code execution or manipulation of app behavior. This could allow installation of malicious apps, persistence of malware, or bypassing security controls enforced by the Galaxy Store. While confidentiality impact is minimal, the integrity of the device and its software environment is at high risk. Organizations relying on Samsung devices for mobile operations, especially those with sensitive data or critical mobile workflows, could face increased risk of compromise or lateral movement within their mobile infrastructure. The vulnerability's local attack vector limits remote exploitation but does not eliminate risk in environments where devices may be shared, lost, or accessed by untrusted users. The absence of known exploits in the wild suggests a window for proactive mitigation before active exploitation occurs.

Mitigation Recommendations

To mitigate CVE-2026-21000, organizations and users should update the Samsung Galaxy Store application to version 4.6.03.8 or later as soon as the patch becomes available. Until then, restrict local access to Samsung devices to trusted users only and enforce strong device-level authentication and lock screens to prevent unauthorized physical access. Employ mobile device management (MDM) solutions to monitor and control app installations and permissions on Samsung devices. Regularly audit installed applications and file system changes on devices to detect suspicious activity related to the Galaxy Store. Additionally, educate users about the risks of granting local access to untrusted parties and the importance of applying updates promptly. Samsung should also consider implementing stricter access control checks and sandboxing mechanisms within the Galaxy Store to prevent similar vulnerabilities in the future.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
SamsungMobile
Date Reserved
2025-12-11T01:33:35.802Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b78c359d4df4518315ee92

Added to database: 3/16/2026, 4:51:01 AM

Last enriched: 3/16/2026, 5:05:54 AM

Last updated: 3/16/2026, 10:25:05 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses