close

Samsung Mobile Security
Cookie Policy

Updated on Jan 17, 2022

This Cookie Policy describes the different types of cookies that may be used in connection with Samsung Mobile Security website which is owned and controlled by Samsung Electronics Co., Ltd (“Samsung Electronics”). This Cookie Policy also describes how you can manage cookies.

It’s important that you check back often for updates to the Policy as we may change it from time to time to reflect changes to our use of cookies. Please check the date at the top of this page to see when this Policy was last revised. Any changes to this Policy will become effective when we make the revised Policy available on our website.

Samsung Electronics has offices across Europe, so we can ensure that your request or query will be handled by the data protection team based in your region. If you have any questions, the easiest way to contact us is through our Privacy Support Page at https://www.samsung.com/request-desk.

You can also contact us at:

European Data Protection Officer
Samsung Electronics (UK) Limited
Samsung House, 2000 Hillswood Drive, Chertsey, Surrey KT16 0RS

Cookies

Cookies are small files that store information on your computer, TV, mobile phone, or other device. They enable the entity that put the cookie on your device to recognize you across different websites, services, devices, and/or browsing sessions.

We use the following types of cookies on this website:

Essential Cookies: enable you to receive the services you request via our website. Without these cookies, services that you have asked for cannot be provided. For example, these enable to identify users and provide proper service for each user. These cookies are automatically enabled and cannot be turned off because they are essential to enable you to browse our website. Without these cookies this Samsung Mobile Security website could not be provided.

Cookie Domain Purpose
JSESSIONID security.samsungmobile.com to keep login session
lastActivityTime security.samsungmobile.com to save the user's last activity time to automatically logout after 30 minutes of inactivity

Managing Cookies and Other Technologies

You can also update your browser settings at any time, if you want to remove or block cookies from your device (consult your browser's "help" menu to learn how to remove or block cookies). Samsung Electronics is not responsible for your browser settings. You can find good and simple instructions on how to manage cookies on the different types of web browsers at http://www.allaboutcookies.org.

Go straight to the menu Go straight to the text

Security Updates

We truly appreciate the following security researchers for helping us improve the security of our mobile applications, wearable devices and personal computers. We would like to thank them for disclosing the vulnerability reports responsibly and working with us throughout the process.

Please note that while we are doing our best to release the security patches as soon as possible to all applicable devices and services, release time of security patches may vary depending on the device version and models or service versions.


Android Applications Updates

SVE-2024-1904(CVE-2025-20901): Out-of-bounds read in Blockchain Keystore

Severity: Moderate
Resolved version: 1.3.16.5
Reported on: September 30, 2024
Description: Out-of-bounds read in Blockchain Keystore prior to version 1.3.16.5 allows local privileged attackers to read out-of-bounds memory.
The patch adds proper input validation.
Acknowledgement: Dawuge


SVE-2024-1601(CVE-2025-20895): Authentication Bypass Using an Alternate Path in Galaxy Store

Severity: Moderate
Resolved version: 4.5.87.6
Reported on: August 12, 2024
Description: Authentication Bypass Using an Alternate Path in Galaxy Store prior to version 4.5.87.6 allows physical attackers to install arbitrary applications to bypass restrictions of Setupwizard.
The patch adds proper access control.
Acknowledgement: RAJESH PORKODI


SVE-2024-1621(CVE-2025-20894): Improper access control in Samsung Email

Severity: High
Resolved version: 6.1.97.1
Reported on: August 15, 2024
Description: Improper access control in Samsung Email prior to version 6.1.97.1 allows physical attackers to access data across multiple user profiles.
The patch adds proper access control.
Acknowledgement: Sam of Honor Cyber Security Lab


SVE-2024-1752(CVE-2025-20896): Use of implicit intent for sensitive communication in EasySetup

Severity: Moderate
Resolved version: 11.1.18
Reported on: September 6, 2024
Description: Use of implicit intent for sensitive communication in EasySetup prior to version 11.1.18 allows local attackers to access sensitive information.
The patch adds proper validation.
Acknowledgement: Dawuge


SVE-2024-1755(CVE-2025-20897): Improper access control in Secure Folder

Severity: High
Resolved version: 1.9.20.50 in Android 14, 1.8.11.0 in Android 13, and 1.7.04.0 in Android 12
Reported on: September 6, 2024
Description: Improper access control in Secure Folder prior to version 1.9.20.50 in Android 14, 1.8.11.0 in Android 13, and 1.7.04.0 in Android 12 allows local attacker to access data in Secure Folder.
The patch adds proper access control.
Acknowledgement: Dawuge


SVE-2024-1772(CVE-2025-20898): Improper input validation in Samsung Members

Severity: High
Resolved version: 5.2.00.12
Reported on: September 8, 2024
Description: Improper input validation in Samsung Members prior to version 5.2.00.12 allows physical attackers to access data across multiple user profiles.
The patch adds proper input validation logic.
Acknowledgement: Sam of Honor Cyber Security Lab


SVE-2024-1883(CVE-2025-20899): Improper access control in PushNotification

Severity: Moderate
Resolved version: 13.0.00.15 in Android 12, 14.0.00.7 in Android 13, and 15.1.00.5 in Android 14
Reported on: September 26, 2024
Description: Improper access control in PushNotification prior to version 13.0.00.15 in Android 12, 14.0.00.7 in Android 13, and 15.1.00.5 in Android 14 allows local attackers to access sensitive information.
The patch removes unnecessary implementation.
Acknowledgement: 刘晓峰


SVE-2024-1888(CVE-2025-20900): Out-of-bounds write in Blockchain Keystore

Severity: High
Resolved version: 1.3.16.5
Reported on: September 27, 2024
Description: Out-of-bounds write in Blockchain Keystore prior to version 1.3.16.5 allows local privileged attackers to write out-of-bounds memory.
The patch adds proper input validation.
Acknowledgement: Dawuge


Other Software Updates

SVE-2024-0968(CVE-2025-20902): Improper access control in Media Controller

Severity: Moderate
Resolved version: 1.0.24.5282
Reported on: April 20, 2024
Description: Improper access control in Media Controller prior to version 1.0.24.5282 allows local attacker to launch activities in MediaController's privilege.
The patch adds proper access control.
Acknowledgement: khilli