close

Samsung Mobile Security
Cookie Policy

Updated on Jan 17, 2022

This Cookie Policy describes the different types of cookies that may be used in connection with Samsung Mobile Security website which is owned and controlled by Samsung Electronics Co., Ltd (“Samsung Electronics”). This Cookie Policy also describes how you can manage cookies.

It’s important that you check back often for updates to the Policy as we may change it from time to time to reflect changes to our use of cookies. Please check the date at the top of this page to see when this Policy was last revised. Any changes to this Policy will become effective when we make the revised Policy available on our website.

Samsung Electronics has offices across Europe, so we can ensure that your request or query will be handled by the data protection team based in your region. If you have any questions, the easiest way to contact us is through our Privacy Support Page at https://www.samsung.com/request-desk.

You can also contact us at:

European Data Protection Officer
Samsung Electronics (UK) Limited
Samsung House, 2000 Hillswood Drive, Chertsey, Surrey KT16 0RS

Cookies

Cookies are small files that store information on your computer, TV, mobile phone, or other device. They enable the entity that put the cookie on your device to recognize you across different websites, services, devices, and/or browsing sessions.

We use the following types of cookies on this website:

Essential Cookies: enable you to receive the services you request via our website. Without these cookies, services that you have asked for cannot be provided. For example, these enable to identify users and provide proper service for each user. These cookies are automatically enabled and cannot be turned off because they are essential to enable you to browse our website. Without these cookies this Samsung Mobile Security website could not be provided.

Cookie Domain Purpose
JSESSIONID security.samsungmobile.com to keep login session
lastActivityTime security.samsungmobile.com to save the user's last activity time to automatically logout after 30 minutes of inactivity

Managing Cookies and Other Technologies

You can also update your browser settings at any time, if you want to remove or block cookies from your device (consult your browser's "help" menu to learn how to remove or block cookies). Samsung Electronics is not responsible for your browser settings. You can find good and simple instructions on how to manage cookies on the different types of web browsers at http://www.allaboutcookies.org.

Go straight to the menu Go straight to the text

Security Updates

We truly appreciate the following security researchers for helping us improve the security of our mobile applications, wearable devices and personal computers. We would like to thank them for disclosing the vulnerability reports responsibly and working with us throughout the process.

Please note that while we are doing our best to release the security patches as soon as possible to all applicable devices and services, release time of security patches may vary depending on the device version and models or service versions.


Android Applications Updates

SVE-2024-0628(CVE-2025-20913): Out-of-bounds read in Samsung Notes

Severity: Moderate
Resolved version: 4.4.26.71
Reported on: March 19, 2024
Description: Out-of-bounds read in applying binary of drawing content in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory.
The patch adds proper input validation.


SVE-2024-0629(CVE-2025-20914): Out-of-bounds read in Samsung Notes

Severity: Moderate
Resolved version: 4.4.26.71
Reported on: March 19, 2024
Description: Out-of-bounds read in applying binary of hand writing content in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory.
The patch adds proper input validation.


SVE-2024-0630(CVE-2025-20915): Out-of-bounds read in Samsung Notes

Severity: Moderate
Resolved version: 4.4.26.71
Reported on: March 19, 2024
Description: Out-of-bounds read in applying binary of voice content in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory.
The patch adds proper input validation.


SVE-2024-0631(CVE-2025-20916): Out-of-bounds read in Samsung Notes

Severity: Moderate
Resolved version: 4.4.26.71
Reported on: March 19, 2024
Description: Out-of-bounds read in reading string of SPen Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory.
The patch adds proper input validation.


SVE-2024-0632(CVE-2025-20917): Out-of-bounds read in Samsung Notes

Severity: Moderate
Resolved version: 4.4.26.71
Reported on: March 19, 2024
Description: Out-of-bounds read in applying binary of pdf content in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory.
The patch adds proper input validation.


SVE-2024-0633(CVE-2025-20918): Out-of-bounds read in Samsung Notes

Severity: Moderate
Resolved version: 4.4.26.71
Reported on: March 19, 2024
Description: Out-of-bounds read in applying extra data of base content in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory.
The patch adds proper input validation.


SVE-2024-0634(CVE-2025-20919): Out-of-bounds read in Samsung Notes

Severity: Moderate
Resolved version: 4.4.26.71
Reported on: March 19, 2024
Description: Out-of-bounds read in applying binary of video content in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory.
The patch adds proper input validation.


SVE-2024-0636(CVE-2025-20920): Out-of-bounds read in Samsung Notes

Severity: Moderate
Resolved version: 4.4.26.71
Reported on: March 19, 2024
Description: Out-of-bounds read in action link data in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory.
The patch adds proper input validation.


SVE-2024-0637(CVE-2025-20921): Out-of-bounds read in Samsung Notes

Severity: Moderate
Resolved version: 4.4.26.71
Reported on: March 19, 2024
Description: Out-of-bounds read in applying binary of text content in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory.
The patch adds proper input validation.


SVE-2024-0661(CVE-2025-20922): Out-of-bounds read in Samsung Notes

Severity: Moderate
Resolved version: 4.4.26.71
Reported on: March 19, 2024
Description: Out-of-bounds read in appending text paragraph in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory.
The patch adds proper input validation.


SVE-2024-0983(CVE-2025-20923): Improper access control in Galaxy Wearable

Severity: Moderate
Resolved version: 2.2.61.24112961
Reported on: April 20, 2024
Description: Improper access control in Galaxy Wearable prior to version 2.2.61.24112961 allows local attackers to launch arbitrary activity with Galaxy Wearable privilege.
The patch adds proper access control.
Acknowledgement: Dawuge


SVE-2024-1303(CVE-2025-20927): Out-of-bounds read in Samsung Notes

Severity: Moderate
Resolved version: 4.4.26.71
Reported on: June 17, 2024
Description: Out-of-bounds read in parsing image data in Samsung Notes prior to vaersion 4.4.26.71 allows local attackers to access out-of-bounds memory.
The patch adds proper length check.


SVE-2024-1426(CVE-2025-20928): Out-of-bounds read in Samsung Notes

Severity: Moderate
Resolved version: 4.4.26.71
Reported on: July 11, 2024
Description: Out-of-bounds read in parsing wbmp image in Samsung Notes prior to vaersion 4.4.26.71 allows local attackers to access out-of-bounds memory.
The patch adds proper length check.
Acknowledgement: Giovanni Di Santi, Alex Birnberg


SVE-2024-1522(CVE-2025-20924): Improper access control in Samsung Notes

Severity: High
Resolved version: 4.4.26.71
Reported on: July 31, 2024
Description: Improper access control in Samsung Notes prior to version 4.4.26.71 allows physical attackers to access data across multiple user profiles.
The patch adds proper access control.
Acknowledgement: Sam of Honor Cyber Security Lab


SVE-2024-1637(CVE-2025-20930, CVE-2025-20929): Out-of-bounds read in Samsung Notes

Severity: High
Resolved version: 4.4.26.71
Reported on: August 19, 2024
Description: Out-of-bounds read and write in parsing jpeg image in Samsung Notes prior to version 4.4.26.71 allows local attackers to read out-of-bounds memory and execute arbitrary code.
The patch adds proper input validation.


SVE-2024-1704(CVE-2025-20925): Out-of-bounds read in Samsung Notes

Severity: Moderate
Resolved version: 4.4.26.71
Reported on: August 30, 2024
Description: Out-of-bounds read in applying binary of text data in Samsung Notes prior to version 4.4.26.71 allows local attackers to potentially read memory.
The patch adds proper input validation.
Acknowledgement: Ye Zhang @VAR10CK of Baidu Security


SVE-2024-1723(CVE-2025-20933, CVE-2025-20932, CVE-2025-20931): Out-of-bounds read in Samsung Notes

Severity: High
Resolved version: 4.4.26.71
Reported on: September 2, 2024
Description: Out-of-bounds write in parsing bmp image in Samsung Notes prior to version 4.4.26.71 allows local attackers to execute arbitrary code.
The patch adds proper input validation.


SVE-2024-2146(CVE-2025-20926): Improper export of Android application components in My Files

Severity: Moderate
Resolved version: 15.0.07.5
Reported on: November 11, 2024
Description: Improper export of Android application components in My Files prior to version 15.0.07.5 in Android 14 allows local attackers to access files with My Files' privilege.
The patch adds proper access control.
Acknowledgement: Ken Gannon


Android Applications Updates

SVE-2024-1904(CVE-2025-20901): Out-of-bounds read in Blockchain Keystore

Severity: Moderate
Resolved version: 1.3.16.5
Reported on: September 30, 2024
Description: Out-of-bounds read in Blockchain Keystore prior to version 1.3.16.5 allows local privileged attackers to read out-of-bounds memory.
The patch adds proper input validation.
Acknowledgement: Dawuge


SVE-2024-1601(CVE-2025-20895): Authentication Bypass Using an Alternate Path in Galaxy Store

Severity: Moderate
Resolved version: 4.5.87.6
Reported on: August 12, 2024
Description: Authentication Bypass Using an Alternate Path in Galaxy Store prior to version 4.5.87.6 allows physical attackers to install arbitrary applications to bypass restrictions of Setupwizard.
The patch adds proper access control.
Acknowledgement: RAJESH PORKODI


SVE-2024-1621(CVE-2025-20894): Improper access control in Samsung Email

Severity: High
Resolved version: 6.1.97.1
Reported on: August 15, 2024
Description: Improper access control in Samsung Email prior to version 6.1.97.1 allows physical attackers to access data across multiple user profiles.
The patch adds proper access control.
Acknowledgement: Sam of Honor Cyber Security Lab


SVE-2024-1752(CVE-2025-20896): Use of implicit intent for sensitive communication in EasySetup

Severity: Moderate
Resolved version: 11.1.18
Reported on: September 6, 2024
Description: Use of implicit intent for sensitive communication in EasySetup prior to version 11.1.18 allows local attackers to access sensitive information.
The patch adds proper validation.
Acknowledgement: Dawuge


SVE-2024-1755(CVE-2025-20897): Improper access control in Secure Folder

Severity: High
Resolved version: 1.9.20.50 in Android 14, 1.8.11.0 in Android 13, and 1.7.04.0 in Android 12
Reported on: September 6, 2024
Description: Improper access control in Secure Folder prior to version 1.9.20.50 in Android 14, 1.8.11.0 in Android 13, and 1.7.04.0 in Android 12 allows local attacker to access data in Secure Folder.
The patch adds proper access control.
Acknowledgement: Dawuge


SVE-2024-1772(CVE-2025-20898): Improper input validation in Samsung Members

Severity: High
Resolved version: 5.2.00.12
Reported on: September 8, 2024
Description: Improper input validation in Samsung Members prior to version 5.2.00.12 allows physical attackers to access data across multiple user profiles.
The patch adds proper input validation logic.
Acknowledgement: Sam of Honor Cyber Security Lab


SVE-2024-1883(CVE-2025-20899): Improper access control in PushNotification

Severity: Moderate
Resolved version: 13.0.00.15 in Android 12, 14.0.00.7 in Android 13, and 15.1.00.5 in Android 14
Reported on: September 26, 2024
Description: Improper access control in PushNotification prior to version 13.0.00.15 in Android 12, 14.0.00.7 in Android 13, and 15.1.00.5 in Android 14 allows local attackers to access sensitive information.
The patch removes unnecessary implementation.
Acknowledgement: 刘晓峰


SVE-2024-1888(CVE-2025-20900): Out-of-bounds write in Blockchain Keystore

Severity: High
Resolved version: 1.3.16.5
Reported on: September 27, 2024
Description: Out-of-bounds write in Blockchain Keystore prior to version 1.3.16.5 allows local privileged attackers to write out-of-bounds memory.
The patch adds proper input validation.
Acknowledgement: Dawuge


Other Software Updates

SVE-2024-0968(CVE-2025-20902): Improper access control in Media Controller

Severity: Moderate
Resolved version: 1.0.24.5282
Reported on: April 20, 2024
Description: Improper access control in Media Controller prior to version 1.0.24.5282 allows local attacker to launch activities in MediaController's privilege.
The patch adds proper access control.
Acknowledgement: khilli