Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21001: CWE-35: Path Traversal in Samsung Mobile Galaxy Store

0
Medium
VulnerabilityCVE-2026-21001cvecve-2026-21001cwe-35
Published: Mon Mar 16 2026 (03/16/2026, 04:32:09 UTC)
Source: CVE Database V5
Vendor/Project: Samsung Mobile
Product: Galaxy Store

Description

CVE-2026-21001 is a medium severity path traversal vulnerability in Samsung Mobile's Galaxy Store prior to version 4. 6. 03. 8. It allows a local attacker to create files with the privileges of the Galaxy Store application by exploiting improper input validation. The vulnerability does not require user interaction or authentication but requires local access to the device. Exploitation could lead to limited integrity impact by enabling unauthorized file creation, potentially affecting system behavior or persistence. No known exploits are currently reported in the wild. Organizations using Samsung Galaxy devices with the vulnerable Galaxy Store version should prioritize patching once available and apply strict local access controls to mitigate risk.

AI-Powered Analysis

AILast updated: 03/16/2026, 05:07:20 UTC

Technical Analysis

CVE-2026-21001 is a path traversal vulnerability identified in Samsung Mobile's Galaxy Store application, affecting versions prior to 4.6.03.8. The flaw arises from improper validation of file path inputs, allowing a local attacker to traverse directories and create files outside the intended directory scope with the privileges of the Galaxy Store app. This vulnerability is categorized under CWE-35 (Path Traversal). The attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The vulnerability impacts integrity significantly (VI:H) but has low impact on availability and confidentiality. Exploiting this flaw could allow attackers to place malicious files or modify existing files, potentially leading to unauthorized code execution, persistence, or manipulation of app behavior. Although no exploits are currently known in the wild, the vulnerability's presence in a widely used app on Samsung devices poses a tangible risk. The CVSS 4.0 base score is 5.9, reflecting a medium severity level. The vulnerability does not affect confidentiality or availability directly but compromises integrity by enabling unauthorized file creation. The scope is unchanged, and no authentication or user interaction is required, making it easier for local attackers to exploit if they gain device access.

Potential Impact

The primary impact of CVE-2026-21001 is on the integrity of affected devices. By allowing local attackers to create files with Galaxy Store privileges, attackers could potentially implant malicious files that affect the app's operation or persist on the device. This could lead to further exploitation, such as privilege escalation or unauthorized code execution, especially if combined with other vulnerabilities. While the vulnerability requires local access, this is a significant risk in scenarios where devices are shared, lost, or compromised via other means. The availability and confidentiality of the device are not directly impacted by this vulnerability. Organizations relying on Samsung Galaxy devices, particularly those with sensitive data or critical mobile applications, could face increased risk of targeted attacks or persistence mechanisms. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for future exploitation. Overall, the vulnerability could undermine trust in device integrity and complicate incident response if exploited.

Mitigation Recommendations

To mitigate CVE-2026-21001, organizations and users should: 1) Update the Galaxy Store app to version 4.6.03.8 or later as soon as the patch is available from Samsung to eliminate the vulnerability. 2) Enforce strict local access controls on devices, including strong lock screens, biometric authentication, and device encryption to prevent unauthorized local access. 3) Limit physical access to devices and educate users on the risks of sharing devices or installing untrusted applications that could facilitate local exploitation. 4) Monitor device behavior for unusual file creation or modifications within the Galaxy Store directories, using mobile endpoint detection tools where feasible. 5) Employ mobile device management (MDM) solutions to enforce app updates and security policies centrally. 6) Consider disabling or restricting the Galaxy Store app in enterprise environments where alternative app distribution methods exist, reducing the attack surface. 7) Maintain regular backups of critical mobile data to recover from potential compromise. These steps go beyond generic advice by focusing on controlling local access, monitoring specific app behavior, and leveraging enterprise management tools.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
SamsungMobile
Date Reserved
2025-12-11T01:33:35.802Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b78c359d4df4518315ee95

Added to database: 3/16/2026, 4:51:01 AM

Last enriched: 3/16/2026, 5:07:20 AM

Last updated: 3/16/2026, 8:11:55 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses