close

Samsung Mobile Security
Cookie Policy

Updated on Jan 17, 2022

This Cookie Policy describes the different types of cookies that may be used in connection with Samsung Mobile Security website which is owned and controlled by Samsung Electronics Co., Ltd (“Samsung Electronics”). This Cookie Policy also describes how you can manage cookies.

It’s important that you check back often for updates to the Policy as we may change it from time to time to reflect changes to our use of cookies. Please check the date at the top of this page to see when this Policy was last revised. Any changes to this Policy will become effective when we make the revised Policy available on our website.

Samsung Electronics has offices across Europe, so we can ensure that your request or query will be handled by the data protection team based in your region. If you have any questions, the easiest way to contact us is through our Privacy Support Page at https://www.samsung.com/request-desk.

You can also contact us at:

European Data Protection Officer
Samsung Electronics (UK) Limited
Samsung House, 2000 Hillswood Drive, Chertsey, Surrey KT16 0RS

Cookies

Cookies are small files that store information on your computer, TV, mobile phone, or other device. They enable the entity that put the cookie on your device to recognize you across different websites, services, devices, and/or browsing sessions.

We use the following types of cookies on this website:

Essential Cookies: enable you to receive the services you request via our website. Without these cookies, services that you have asked for cannot be provided. For example, these enable to identify users and provide proper service for each user. These cookies are automatically enabled and cannot be turned off because they are essential to enable you to browse our website. Without these cookies this Samsung Mobile Security website could not be provided.

Cookie Domain Purpose
JSESSIONID security.samsungmobile.com to keep login session
lastActivityTime security.samsungmobile.com to save the user's last activity time to automatically logout after 30 minutes of inactivity

Managing Cookies and Other Technologies

You can also update your browser settings at any time, if you want to remove or block cookies from your device (consult your browser's "help" menu to learn how to remove or block cookies). Samsung Electronics is not responsible for your browser settings. You can find good and simple instructions on how to manage cookies on the different types of web browsers at http://www.allaboutcookies.org.

Go straight to the menu Go straight to the text

Security Updates

Disclaimer

  • Please note that in some cases regular OS upgrades may cause delays to planned security updates. However, users can be rest assured the OS upgrades will include up-to-date security patches when delivered.
  • While we are doing our best to deliver the security patches as soon as possible to all applicable models, delivery time of security patches may vary depending on the regions and models.
  • Some patches to be received from chipset vendors (also known as Device Specific patches) may not be included in the security update package of the month. They will be included in upcoming security update packages as soon as the patches are ready to deliver.

Acknowledgements

Samsung Mobile is releasing a maintenance release for major flagship models as part of monthly Security Maintenance Release (SMR) process. This SMR package includes patches from Google and Samsung.


Google patches include patches up to Android Security Bulletin – February 2025 package. The Bulletin (February 2025) contains the following CVE items:

Critical
CVE-2024-20154

High
CVE-2024-43704, CVE-2024-20143, CVE-2024-20144, CVE-2024-20145, CVE-2024-20105, CVE-2024-20140, CVE-2024-20146, CVE-2024-20148, CVE-2024-21464, CVE-2024-45553, CVE-2024-45558, CVE-2024-49721, CVE-2024-49743, CVE-2024-49746, CVE-2025-0097, CVE-2025-0098, CVE-2025-0099, CVE-2023-40122, CVE-2023-40133, CVE-2023-40134, CVE-2023-40135, CVE-2023-40136, CVE-2023-40137, CVE-2023-40138, CVE-2023-40139, CVE-2024-0037, CVE-2025-0100, CVE-2024-49741, CVE-2025-0094, CVE-2023-24023, CVE-2025-0091, CVE-2025-0095, CVE-2024-49723, CVE-2024-49729

Moderate
None

Already included in previous updates
None

Not applicable to Samsung devices
CVE-2025-0096, CVE-2024-49731


※ Please see Android Security Bulletin for detailed information on Google patches.


Along with Google patches, Samsung Mobile provides 7 Samsung Vulnerabilities and Exposures (SVE) items described below, in order to improve our customer’s confidence on security of Samsung Mobile devices. Samsung security index (SSI), found in “Security software version”, SMR Feb-2025 Release 1 includes all patches from Samsung and Google. Some of the SVE items may not be included in this package, in case these items were already included in a previous maintenance release.


SVE-2024-2120(CVE-2025-20904): Out-of-bounds write in mPOS TUI trustlet

Severity: High
Affected versions: Android 12, 13, 14 devices using Qualcomm chipsets
Reported on: November 7, 2024
Disclosure status: Privately disclosed
Out-of-bounds write in mPOS TUI trustlet prior to SMR Feb-2025 Release 1 allows local privileged attackers to cause memory corruption.
The patch adds proper input validation.


SVE-2024-2122(CVE-2025-20905): Out-of-bounds read and write in mPOS TUI trustlet

Severity: High
Affected versions: Android 12, 13, 14 devices using Qualcomm chipsets
Reported on: November 7, 2024
Disclosure status: Privately disclosed
Out-of-bounds read and write in mPOS TUI trustlet prior to SMR Feb-2025 Release 1 allows local privileged attackers to read and write out-of-bounds memory.
The patch adds proper input validation.


SVE-2024-2229(CVE-2025-20906): Improper Export of Android Application Components in Settings

Severity: High
Affected versions: Android Watch 14
Reported on: November 25, 2024
Disclosure status: Privately disclosed
Improper Export of Android Application Components in Settings prior to SMR Feb-2025 Release 1 allows local attackers to enable ADB.
The patch adds proper permission.


SVE-2024-2264(CVE-2025-20907): Improper privilege management in Samsung Find

Severity: Moderate
Affected versions: Android 12, 13 14
Reported on: December 3, 2024
Disclosure status: Privately disclosed
Improper privilege management in Samsung Find prior to SMR Feb-2025 Release 1 allows local privileged attackers to disable Samsung Find.
The patch adds proper privilege management.


Some SVE items included in the Samsung Android Security Update cannot be disclosed at this time.


Acknowledgements
Dawuge of Shuffle Team: SVE-2024-2120, SVE-2024-2122
localh0ster: SVE-2024-2229
hsia.angsh: SVE-2024-2264
Samsung Mobile is releasing a maintenance release for major flagship models as part of monthly Security Maintenance Release (SMR) process. This SMR package includes patches from Google and Samsung.


Google patches include patches up to Android Security Bulletin – January 2025 package. The Bulletin (January 2025) contains the following CVE items:

Critical
CVE-2024-43096, CVE-2024-43770, CVE-2024-43771, CVE-2024-49747, CVE-2024-49748

High
CVE-2024-43077, CVE-2024-43701, CVE-2024-33056, CVE-2024-33044, CVE-2024-43052, CVE-2022-42545, CVE-2024-49732, CVE-2024-49735, CVE-2024-49737, CVE-2024-49738, CVE-2024-49744, CVE-2024-49745, CVE-2023-40108, CVE-2024-49733, CVE-2023-40132, CVE-2024-49749, CVE-2024-34722, CVE-2024-34730, CVE-2024-43095, CVE-2024-43765, CVE-2024-49742, CVE-2024-49734, CVE-2024-43763, CVE-2024-49736

Moderate
None

Already included in previous updates
CVE-2024-20125

Not applicable to Samsung devices
CVE-2024-43048, CVE-2024-33063


※ Please see Android Security Bulletin for detailed information on Google patches.


Along with Google patches, Samsung Mobile provides 22 Samsung Vulnerabilities and Exposures (SVE) items described below, in order to improve our customer’s confidence on security of Samsung Mobile devices. Samsung security index (SSI), found in “Security software version”, SMR Jan-2025 Release 1 includes all patches from Samsung and Google. Some of the SVE items may not be included in this package, in case these items were already included in a previous maintenance release.


SVE-2024-0274(CVE-2025-20881): Out-of-bounds write in libsthmbc.so

Severity: High
Affected versions: Android 12, 13, 14
Reported on: February 2, 2024
Disclosure status: Privately disclosed
Out-of-bounds write in accessing buffer storing the decoded video frames in libsthmbc.so prior to SMR Jan-2025 Release 1 allows local attackers to execute arbitrary code with privilege. User interaction is required for triggering this vulnerability.
The patch adds proper input validation.


SVE-2024-0308(CVE-2025-20882): Out-of-bounds write in libsthmbc.so

Severity: High
Affected versions: Android 12, 13, 14
Reported on: February 7, 2024
Disclosure status: Privately disclosed
Out-of-bounds write in accessing uninitialized memory for svc1td in libsthmbc.so prior to SMR Jan-2025 Release 1 allows local attackers to execute arbitrary code with privilege. User interaction is required for triggering this vulnerability.
The patch adds proper input validation.


SVE-2024-1217(CVE-2025-20883): Improper access control in SoundPicker

Severity: High
Affected versions: Android 12, 13, 14
Reported on: May 29, 2024
Disclosure status: Privately disclosed
Improper access control in SoundPicker prior to SMR Jan-2025 Release 1 allows physical attackers to access data across multiple user profiles.
The patch adds proper access control.


SVE-2024-1527(CVE-2025-20884): Improper access control in Samsung Message

Severity: High
Affected versions: Android 12, 13, 14
Reported on: July 31, 2024
Disclosure status: Privately disclosed
Improper access control in Samsung Message prior to SMR Jan-2025 Release 1 allows physical attackers to access data across multiple user profiles.
The patch adds proper access control.


SVE-2024-1828(CVE-2025-20885): Out-of-bounds write in softsim TA

Severity: High
Affected versions: Select Android 12, 13, 14 devices
Reported on: September 19, 2024
Disclosure status: Privately disclosed
Out-of-bounds write in softsim TA prior to SMR Jan-2025 Release 1 allows local privileged attackers to cause memory corruption.
The patch adds proper input validation.


SVE-2024-1834(CVE-2025-20886): Inclusion of sensitive information in test code in softsim TA

Severity: Moderate
Affected versions: Select Android 12, 13, 14 devices
Reported on: September 19, 2024
Disclosure status: Privately disclosed
Inclusion of sensitive information in test code in softsim TA prior to SMR Jan-2025 Release 1 allows local privileged attackers to get test key.
The patch removes test code.


SVE-2024-1875(CVE-2025-20893): Improper access control in NotificationManager

Severity: Moderate
Affected versions: Android 14
Reported on: September 25, 2024
Disclosure status: Privately disclosed
Improper access control in NotificationManager prior to SMR Jan-2025 Release 1 allows local attackers to change the configuration of notifications.
The patch adds proper access control.


SVE-2024-2153(CVE-2025-20887): Out-of-bounds read in libsthmbc.so

Severity: Moderate
Affected versions: Android 12, 13, 14
Reported on: November 12, 2024
Disclosure status: Privately disclosed
Out-of-bounds read in accessing table used for svp8t in libsthmbc.so prior to SMR Jan-2025 Release 1 allows local attackers to read arbitrary memory. User interaction is required for triggering this vulnerability.
The patch adds proper input validation.


SVE-2024-2154(CVE-2025-20888): Out-of-bounds write in libsthmbc.so

Severity: High
Affected versions: Android 12, 13, 14
Reported on: November 12, 2024
Disclosure status: Privately disclosed
Out-of-bounds write in handling the block size for smp4vtd in libsthmbc.so prior to SMR Jan-2025 Release 1 allows local attackers to execute arbitrary code with privilege. User interaction is required for triggering this vulnerability.
The patch adds proper input validation.


SVE-2024-2156(CVE-2025-20889): Out-of-bounds read in libsthmbc.so

Severity: Moderate
Affected versions: Android 12, 13, 14
Reported on: November 12, 2024
Disclosure status: Privately disclosed
Out-of-bounds read in decoding malformed bitstream for smp4vtd in libsthmbc.so prior to SMR Jan-2025 Release 1 allows local attackers to read arbitrary memory. User interaction is required for triggering this vulnerability.
The patch adds proper input validation.


SVE-2024-2157(CVE-2025-20890): Out-of-bounds write in libsthmbc.so

Severity: High
Affected versions: Android 12, 13, 14
Reported on: November 12, 2024
Disclosure status: Privately disclosed
Out-of-bounds write in decoding frame buffer in libsthmbc.so prior to SMR Jan-2025 Release 1 allows local attackers to execute arbitrary code with privilege. User interaction is required for triggering this vulnerability.
The patch adds proper input validation.


SVE-2024-2158(CVE-2025-20891): Out-of-bounds read in libsthmbc.so

Severity: Moderate
Affected versions: Android 12, 13, 14
Reported on: November 12, 2024
Disclosure status: Privately disclosed
Out-of-bounds read in decoding malformed bitstream of video thumbnails in libsthmbc.so prior to SMR Jan-2025 Release 1 allows local attackers to read arbitrary memory. User interaction is required for triggering this vulnerability.
The patch removed deprecated implementation.


SVE-2024-2171(CVE-2025-20892): Protection Mechanism Failure in bootloader

Severity: High
Affected versions: Select Android 13, 14 devices using MediaTek chipset
Reported on: November 14, 2024
Disclosure status: Privately disclosed
Protection Mechanism Failure in bootloader prior to SMR Jan-2025 Release 1 allows physical attackers to execute fastboot command. User interaction is required for triggering this vulnerability.
The patch enables Samsung bootloader feature.


Some SVE items included in the Samsung Android Security Update cannot be disclosed at this time.


Acknowledgements
ycmint working at ADLab of VenusTech: SVE-2024-1217
Sam of Honor Cyber Security Lab: SVE-2024-1527
tdx: SVE-2024-1828, SVE-2024-1834
hsia.angsh: SVE-2024-1875
Andrea Toska: SVE-2024-2171