close

Samsung Mobile Security
Cookie Policy

Updated on Jan 17, 2022

This Cookie Policy describes the different types of cookies that may be used in connection with Samsung Mobile Security website which is owned and controlled by Samsung Electronics Co., Ltd (“Samsung Electronics”). This Cookie Policy also describes how you can manage cookies.

It’s important that you check back often for updates to the Policy as we may change it from time to time to reflect changes to our use of cookies. Please check the date at the top of this page to see when this Policy was last revised. Any changes to this Policy will become effective when we make the revised Policy available on our website.

Samsung Electronics has offices across Europe, so we can ensure that your request or query will be handled by the data protection team based in your region. If you have any questions, the easiest way to contact us is through our Privacy Support Page at https://www.samsung.com/request-desk.

You can also contact us at:

European Data Protection Officer
Samsung Electronics (UK) Limited
Samsung House, 2000 Hillswood Drive, Chertsey, Surrey KT16 0RS

Cookies

Cookies are small files that store information on your computer, TV, mobile phone, or other device. They enable the entity that put the cookie on your device to recognize you across different websites, services, devices, and/or browsing sessions.

We use the following types of cookies on this website:

Essential Cookies: enable you to receive the services you request via our website. Without these cookies, services that you have asked for cannot be provided. For example, these enable to identify users and provide proper service for each user. These cookies are automatically enabled and cannot be turned off because they are essential to enable you to browse our website. Without these cookies this Samsung Mobile Security website could not be provided.

Cookie Domain Purpose
JSESSIONID security.samsungmobile.com to keep login session
lastActivityTime security.samsungmobile.com to save the user's last activity time to automatically logout after 30 minutes of inactivity

Managing Cookies and Other Technologies

You can also update your browser settings at any time, if you want to remove or block cookies from your device (consult your browser's "help" menu to learn how to remove or block cookies). Samsung Electronics is not responsible for your browser settings. You can find good and simple instructions on how to manage cookies on the different types of web browsers at http://www.allaboutcookies.org.

Go straight to the menu Go straight to the text

Security Updates

We truly appreciate the following security researchers for helping us improve the security of our mobile applications, wearable devices and personal computers. We would like to thank them for disclosing the vulnerability reports responsibly and working with us throughout the process.

Please note that while we are doing our best to release the security patches as soon as possible to all applicable devices and services, release time of security patches may vary depending on the device version and models or service versions.


Android Applications Updates

SVE-2022-3000(CVE-2023-42571): Abuse of remote unlock

Severity: High
Resolved version: 7.3.13.4
Reported on: December 21, 2022
Description: Abuse of remote unlock in Find My Mobile prior to version 7.3.13.4 allows physical attacker to unlock the device remotely by resetting the Samsung Account password with SMS verification when user lost the device.
End of Support for remote unlock feature.
Acknowledgement: Ademar Nowasky Junior


SVE-2023-0760(CVE-2023-42572): Implicit intent hijacking vulnerability in Samsung Account Web SDK

Severity: Moderate
Resolved version: 1.5.24
Reported on: May 1, 2023
Description: Implicit intent hijacking vulnerability in Samsung Account Web SDK prior to version 1.5.24 allows attacker to get sensitive information.
The patch change the implicit intent to explicit intent.
Acknowledgement: Oversecured (oversecured.com)


SVE-2023-0824(CVE-2023-42573): PendingIntent hijacking vulnerability in Search Widget

Severity: Moderate
Resolved version: 3.4
Reported on: May 12, 2023
Description: PendingIntent hijacking vulnerability in Search Widget prior to version 3.4 in China models allows local attackers to access data.
The patch adjusts the intent to prevent PendingIntent hijacking.
Acknowledgement: hackhackdump


SVE-2023-1413(CVE-2023-42574): Improper access control vulnerability in GameHomeCN

Severity: Moderate
Resolved version: 4.2.60.2
Reported on: July 27, 2023
Description: Improper access control vulnerablility in GameHomeCN prior to version 4.2.60.2 allows local attackers to launch arbitrary activity in GameHomeCN.
The patch removes unused code.
Acknowledgement: hackhackdump


SVE-2023-1443(CVE-2023-42575): Improper Authentication vulnerability in Samsung Pass

Severity: Moderate
Resolved version: 4.3.00.17
Reported on: August 4, 2023
Description: Improper Authentication vulnerability in Samsung Pass prior to version 4.3.00.17 allows physical attackers to bypass authentication due to invalid flag setting.
The patch adds proper authentication logic.
Acknowledgement: Harsh Tyagi


SVE-2023-1482(CVE-2023-42576): Improper Authentication vulnerability in Samsung Pass

Severity: Moderate
Resolved version: 4.3.00.17
Reported on: August 9, 2023
Description: Improper Authentication vulnerability in Samsung Pass prior to version 4.3.00.17 allows physical attackers to bypass authentication due to invalid exception handler.
The patch adds proper authentication logic.
Acknowledgement: Harsh Tyagi


SVE-2023-1525(CVE-2023-42577): Improper Access Control in Samsung Voice Recorder

Severity: Moderate
Resolved version: 21.4.15.01 in Android 12 and Android 13, 21.4.50.17 in Android 14
Reported on: August 18, 2023
Description: Improper Access Control in Samsung Voice Recorder prior to versions 21.4.15.01 in Android 12 and Android 13, 21.4.50.17 in Android 14 allows physical attackers to access Voice Recorder information on the lock screen.
The patch adds proper access control in Samsung Voice Recorder.
Acknowledgement: Elias Schröder


SVE-2023-1774(CVE-2023-42578): Improper handling of insufficient permissions or privileges vulnerability in Samsung Data Store

Severity: Moderate
Resolved version: 5.2.00.7
Reported on: October 8, 2023
Description: Improper handling of insufficient permissions or privileges vulnerability in Samsung Data Store prior to version 5.2.00.7 allows remote attackers to access location information without permission.
The patch adds proper location permission dialog for location information.
Acknowledgement: Zhang Qing, Wang Kailong


SVE-2023-1908(CVE-2023-42579): Improper usage of insecure protocol in SogouSDK of Chinese Samsung Keyboard

Severity: Moderate
Resolved version: 5.3.70.1 in Android 11, 5.4.60.49, 5.4.85.5, 5.5.00.58 in Android 12, and 5.6.00.52, 5.6.10.42, 5.7.00.45 in Android 13
Reported on: October 17, 2023
Description: Improper usage of insecure protocol (i.e. HTTP) in SogouSDK of Chinese Samsung Keyboard prior to versions 5.3.70.1 in Android 11, 5.4.60.49, 5.4.85.5, 5.5.00.58 in Android 12, and 5.6.00.52, 5.6.10.42, 5.7.00.45 in Android 13 allows adjacent attackers to access keystroke data using Man-in-the-Middle attack.
The patch change the insecure protocol (i.e. HTTP) to secure protocol (i.e. HTTPS)
Acknowledgement: Citizen Lab


SVE-2023-1952(CVE-2023-42580): Improper input validation vulnerability in Galaxy Store

Severity: Critical
Resolved version: 4.5.64.4
Reported on: October 25, 2023
Description: Improper URL validation from MCSLaunch deeplink in Galaxy Store prior to version 4.5.64.4 allows attackers to execute JavaScript API to install APK from Galaxy Store.
The patch adds proper URL validation logic.
Acknowledgement: Pentest Limited working with Zero Day Initiative


SVE-2023-1959(CVE-2023-42581): Improper Input Validation vulnerability in Galaxy Store

Severity: High
Resolved version: 4.5.64.4
Reported on: October 26, 2023
Description: Improper URL validation from InstantPlay deeplink in Galaxy Store prior to version 4.5.64.4 allows attackers to execute JavaScript API to access data.
The patch adds proper URL validation logic.
Acknowledgement: Interrupt Labs working with Zero Day Initiative


Android Applications Updates

SVE-2023-0668(CVE-2023-42539): PendingIntent hijacking vulnerability in Samsung Health

Severity: Moderate
Resolved version: 6.25
Reported on: April 17, 2023
Description: PendingIntent hijacking vulnerability in ChallengeNotificationManager in Samsung Health prior to version 6.25 allows local attackers to access data.
The patch adds proper access control.
Acknowledgement: Oversecured (oversecured.com)


SVE-2023-0928(CVE-2023-42540): Improper access control vulnerability in Samsung Account

Severity: Moderate
Resolved version: 14.5.01.1
Reported on: May 29, 2023
Description: Improper access control vulnerability in Samsung Account prior to version 14.5.01.1 allows attackers to access sensitive information via implicit intent.
The patch adds proper access control to use explicit intent.
Acknowledgement: Oversecured (oversecured.com)


SVE-2023-1287(CVE-2023-42541): Improper authorization in Samsung Push Service

Severity: Moderate
Resolved version: 3.4.10
Reported on: July 5, 2023
Description: Improper authorization in PushClientProvider of Samsung Push Service prior to version 3.4.10 allows attacker to access unique id.
The patch block the access to PushClientProvider.
Acknowledgement: hsia.angsh


SVE-2023-1372(CVE-2023-42542): Improper access control in Samsung Push Service

Severity: Moderate
Resolved version: 3.4.10
Reported on: July 21, 2023
Description: Improper access control vulnerability in Samsung Push Service prior to 3.4.10 allows local attackers to get register ID to identify the device.
The patch adds proper access control check logic.
Acknowledgement: Zhang Qing, Wang Kailong


SVE-2023-1414(CVE-2023-42543): Improper verification of intent by broadcast receiver vulnerability in Bixby Voice

Severity: Moderate
Resolved version: 3.3.35.12
Reported on: July 27, 2023
Description: Improper verification of intent by broadcast receiver vulnerability in Bixby Voice prior to version 3.3.35.12 allows attackers to access arbitrary data with Bixby Voice privilege.
The patch adds proper access control to use LocalBroadcastManager.
Acknowledgement: hackhackdump


SVE-2023-1416(CVE-2023-42544): Improper access control vulnerability in Quick Share

Severity: Moderate
Resolved version: 13.5.52.0
Reported on: July 28, 2023
Description: Improper access control vulnerability in Quick Share prior to 13.5.52.0 allows local attacker to access local files.
The patch adds proper access control.
Acknowledgement: OrangeCat


SVE-2023-1454(CVE-2023-42545): Use of implicit intent for sensitive communication vulnerability in Phone

Severity: Moderate
Resolved version: 12.7.20.12 in Android 11, 13.1.48, 13.5.28 in Android 12, and 14.7.38 in Android 13
Reported on: August 6, 2023
Description: Use of implicit intent for sensitive communication vulnerability in Phone prior to versions 12.7.20.12 in Android 11, 13.1.48, 13.5.28 in Android 12, and 14.7.38 in Android 13 allows attackers to access location data.
The patch adds proper access control to use explicit intent.
Acknowledgement: OrangeCat


SVE-2023-1502(CVE-2023-42551, CVE-2023-42550, CVE-2023-42549, CVE-2023-42548, CVE-2023-42547, CVE-2023-42546): Use of implicit intent for sensitive communication vulnerability in Samsung Account

Severity: Moderate
Resolved version: 14.5.00.7
Reported on: August 12, 2023
Description: Use of implicit intent for sensitive communication vulnerability in Samsung Account prior to version 14.5.00.7 allows attackers to access arbitrary file with Samsung Account privilege.
The patch adds proper access control to use explicit intent.
Acknowledgement: OrangeCat


SVE-2023-1503(CVE-2023-42552): Implicit intent hijacking vulnerability in Firewall application

Severity: Moderate
Resolved version: 12.1.00.24 in Android 11, 13.1.00.16 in Android 12 and 14.1.00.7 in Android 13
Reported on: August 12, 2023
Description: Implicit intent hijacking vulnerability in Firewall application prior to versions 12.1.00.24 in Android 11, 13.1.00.16 in Android 12 and 14.1.00.7 in Android 13 allows 3rd party application to tamper the database of Firewall.
The patch changes the implicit intent to explicit intent to prevent hijacking.
Acknowledgement: OrangeCat


SVE-2023-1545(CVE-2023-42553): Improper authorization verification vulnerability in Samsung Email

Severity: Moderate
Resolved version: 6.1.90.4
Reported on: August 20, 2023
Description: Improper authorization verification vulnerability in Samsung Email prior to version 6.1.90.4 allows attackers to read sandbox data of email.
The patch adds proper authorization verification logic to prevent unauthorized access.
Acknowledgement: OrangeCat


SVE-2023-1557(CVE-2023-42554): Improper Authentication vulnerability in SamsungPass

Severity: Moderate
Resolved version: 4.3.00.17
Reported on: August 22, 2023
Description: Improper Authentication vulnerability in SamsungPass prior to version 4.3.00.17 allows physical attackers to bypass authentication.
The patch adds proper authentication logic.
Acknowledgement: Harsh Tyagi


SVE-2023-1625(CVE-2023-42555): Use of implicit intent for sensitive communication vulnerability in EasySetup

Severity: Moderate
Resolved version: 11.1.13
Reported on: September 6, 2023
Description: Use of implicit intent for sensitive communication vulnerability in EasySetup prior to version 11.1.13 allows attackers to get the bluetooth address of user device.
The patch adds proper access control to use explicit intent.


Android Applications Updates

SVE-2023-0759(CVE-2023-30734): Improper access control vulnerability in Samsung Health

Severity: Moderate
Resolved version: 6.24.3.007
Reported on: May 1, 2023
Description: Improper access control vulnerability in GroupChallengeFeedActivity in Samsung Health prior to version 6.24.3.007 allows attackers to access sensitive information via implicit intent.
The patch adds proper access control to use explicit intent.
Acknowledgement: Oversecured (oversecured.com)


SVE-2023-1015(CVE-2023-30735): Improper Preservation of Permissions vulnerability in SAssistant

Severity: Moderate
Resolved version: 8.7
Reported on: June 9, 2023
Description: Improper Preservation of Permissions vulnerability in SAssistant prior to version 8.7 allows local attackers to access backup data in SAssistant.
The patch adds proper permission to prevent unauthorized access.
Acknowledgement: Stealth Assassin


SVE-2023-1109(CVE-2023-30736): Improper authorization in PushMsgReceiver of Samsung Assistant

Severity: Moderate
Resolved version: 8.7.00.1
Reported on: June 20, 2023
Description: Improper authorization in PushMsgReceiver of Samsung Assistant prior to version 8.7.00.1 allows attacker to execute javascript interface. To trigger this vulnerability, user interaction is required.
The patch removes unused code.
Acknowledgement: Stealth Assassin


SVE-2023-1658(CVE-2023-30737): Improper access control vulnerability in Samsung Health

Severity: Moderate
Resolved version: 6.24.3.007
Reported on: September 14, 2023
Description: Improper access control vulnerability in Setting in Samsung Health prior to version 6.24.3.007 allows attackers to access sensitive information via implicit intent.
The patch adds proper access control to use explicit intent.
Acknowledgement: Oversecured (oversecured.com)


PC Updates

SVE-2023-0437(CVE-2023-30738): An improper input validation in UEFI Firmware

Severity: Moderate
Resolved version: Firmware update Oct-2023 Release
Reported on: March 18, 2023
Description: An improper input validation in UEFI Firmware prior to Firmware update Oct-2023 Release in Galaxy Book, Galaxy Book Pro, Galaxy Book Pro 360 and Galaxy Book Odyssey allows local attacker to execute SMM memory corruption.
The patch adds proper boundary check logic to prevent SMM memory corruption.
Acknowledgement: Sung-Min Kim, Jae-Min Kim, Chan-Ho Kim, Sang-Hyeon Park and Gwi-Hyeon Yang


Android Applications Updates

SVE-2023-0495(CVE-2023-30722): Protection Mechanism Failure in bc_tui trustlet from Samsung Blockchain Keystore

Severity: High
Resolved version: 1.3.13.5
Reported on: March 29, 2023
Description: Protection Mechanism Failure in bc_tui trustlet from Samsung Blockchain Keystore prior to version 1.3.13.5 allows local attacker to execute arbitrary code.
The patch adds proper protection mechanism.
Acknowledgement: Lumine, Markak, F4lt, and Kang from Certik Skyfall Team


SVE-2023-0667(CVE-2023-30723): Improper input validation vulnerability in Samsung Health

Severity: Moderate
Resolved version: 6.24.2.011
Reported on: April 17, 2023
Description: Improper input validation vulnerability in Samsung Health prior to version 6.24.2.011 allows attackers to write arbitrary file with Samsung Health privilege.
The patch adds proper input validation.
Acknowledgement: Oversecured (oversecured.com)


SVE-2023-0812(CVE-2023-30724): Improper authentication in Gallery

Severity: Moderate
Resolved version: 14.5.01.2
Reported on: May 11, 2023
Description: Improper authentication in GallerySearchProvider of Gallery prior to version 14.5.01.2 allows attacker to access search history.
The patch modifies the authentication logic.
Acknowledgement: Jang Taejin @jtjisgod


SVE-2023-0822(CVE-2023-30725): Improper authentication in Gallery

Severity: Moderate
Resolved version: 14.5.01.2
Reported on: May 11, 2023
Description: Improper authentication in LocalProvier of Gallery prior to version 14.5.01.2 allows attacker to access the data in content provider.
The patch modifies the authentication logic.
Acknowledgement: Dongxiang Ke of Baidu AIoT Security Team.


SVE-2023-0823(CVE-2023-30726): PendingIntent hijacking vulnerability in GameLauncher

Severity: Moderate
Resolved version: 4.2.59.5
Reported on: May 11, 2023
Description: PendingIntent hijacking vulnerability in GameLauncher prior to version 4.2.59.5 allows local attackers to access data.
The patch removes unused code.
Acknowledgement: hackhackdump


SVE-2023-0973(CVE-2023-30728): Intent redirection in PackageInstallerCHN

Severity: Moderate
Resolved version: 13.1.03.00
Reported on: June 4, 2023
Description: Intent redirection vulnerability in PackageInstallerCHN prior to version 13.1.03.00 allows local attacker to access arbitrary file. This vulnerability requires user interaction.
The patch modifies the logic that return the execution result.
Acknowledgement: hackhackdump


SVE-2023-1004(CVE-2023-30729): Improper Certificate Validation in Samsung Email

Severity: High
Resolved version: 6.1.82.0
Reported on: June 9, 2023
Description: Improper Certificate Validation in Samsung Email prior to version 6.1.82.0 allows remote attacker to intercept the network traffic including sensitive information.
The patch adds proper certificate validation.
Acknowledgement: Aapo Oksman


Other Software Updates

SVE-2023-0593(CVE-2023-30730): Implicit intent hijacking vulnerability in Camera

Severity: Moderate
Resolved version: 11.0.16.43 in Android 11, 12.1.00.30, 12.0.07.53, 12.1.03.10 in Android 12, and 13.0.01.43, 13.1.00.83 in Android 13
Reported on: April 7, 2023
Description: Implicit intent hijacking vulnerability in Camera prior to versions 11.0.16.43 in Android 11, 12.1.00.30, 12.0.07.53, 12.1.03.10 in Android 12, and 13.0.01.43, 13.1.00.83 in Android 13 allows local attacker to access specific file.
The patch change the implicit intent to explicit intent.
Acknowledgement: Oversecured (oversecured.com)


Android Applications Updates

SVE-2023-0489(CVE-2023-30703): Improper URL validation vulnerability in Samsung Members

Severity: Moderate
Resolved version: 14.0.07.1
Reported on: March 28, 2023
Description: Improper URL validation vulnerability in Samsung Members prior to version 14.0.07.1 allows attackers to access sensitive information.
The patch deletes vulnerable codes to prevent improper access to sensitive information.
Acknowledgement: Stealth Assassin


SVE-2023-0801(CVE-2023-30704): Improper Authorization vulnerability in Samsung Internet

Severity: Moderate
Resolved version: 22.0.0.35
Reported on: May 9, 2023
Description: Improper Authorization vulnerability in Samsung Internet prior to version 22.0.0.35 allows physical attacker access downloaded files in Secret Mode without user authentication.
The patch addresses the file access logic.
Acknowledgement: Harsh Tyagi


SVE-2023-0971(CVE-2023-30705): Possible to access arbitrary content providers as Galaxy Store permission

Severity: High
Resolved version: 4.5.56.6
Reported on: June 4, 2023
Description: Improper sanitization of incoming intent in Galaxy Store prior to version 4.5.56.6 allows local attackers to access privileged content providers as Galaxy Store permission.
The patch adds proper sanitization codes to prevent improper access.
Acknowledgement: hackhackdump


PC Updates

SVE-2023-0470(CVE-2023-30695): Out-of-bounds Write vulnerability in SSHDCPAPP TA

Severity: High
Resolved version: "SAMSUNG ELECTONICS, CO, LTD. - System Hardware Update - 7/13/2023" in Windows Update for Galaxy book Go, Galaxy book Go 5G, Galaxy book2 Go and Galaxy book2 Pro 360
Reported on: March 23, 2023
Description: Out-of-bounds Write vulnerability in SSHDCPAPP TA prior to "SAMSUNG ELECTONICS, CO, LTD. - System Hardware Update - 7/13/2023" in Windows Update for Galaxy book Go, Galaxy book Go 5G, Galaxy book2 Go and Galaxy book2 Pro 360 allows local attacker to execute arbitrary code.
The patch adds proper check to prevent Out-of-bounds Write.
Acknowledgement: Mahdi Braik of the Apple Media Products RedTeam


SVE-2023-0471(CVE-2023-30702): Stack overflow vulnerability in SSHDCPAPP TA

Severity: High
Resolved version: "SAMSUNG ELECTONICS, CO, LTD. - System Hardware Update - 7/13/2023" in Windows Update for Galaxy book Go, Galaxy book Go 5G, Galaxy book2 Go and Galaxy book2 Pro 360
Reported on: March 23, 2023
Description: Stack overflow vulnerability in SSHDCPAPP TA prior to "SAMSUNG ELECTONICS, CO, LTD. - System Hardware Update - 7/13/2023" in Windows Update for Galaxy book Go, Galaxy book Go 5G, Galaxy book2 Go and Galaxy book2 Pro 360 allows local attacker to execute arbitrary code.
The patch adds proper check to prevent Stack overflow.
Acknowledgement: Mahdi Braik of the Apple Media Products RedTeam


Android Applications Updates

SVE-2023-0711(CVE-2023-30675): Improper authentication in Samsung Pass

Severity: High
Resolved version: 4.2.03.1
Reported on: April 23, 2023
Description: Improper authentication in Samsung Pass prior to version 4.2.03.1 allows local attacker to access stored account information when Samsung Wallet is not installed.
The patch modifies authentication logic.
Acknowledgement: ysmilec


SVE-2023-0753(CVE-2023-30677): Improper access control vulnerability in Samsung Pass

Severity: Moderate
Resolved version: 4.2.03.1
Reported on: April 30, 2023
Description: Improper access control vulnerability in Samsung Pass prior to version 4.2.03.1 allows physical attackers to access data of Samsung Pass on a certain state of an unlocked device.
The patch add proper access control.
Acknowledgement: Harsh Tyagi


SVE-2023-0864(CVE-2023-30678): Potential zip path traversal vulnerability in Calendar application

Severity: Moderate
Resolved version: 12.4.07.15 in Android 13
Reported on: May 15, 2023
Description: Potential zip path traversal vulnerability in Calendar application prior to version 12.4.07.15 in Android 13 allows attackers to write arbitrary file.
The patch adds mitigation logic to prevent path traversal.
Acknowledgement: hackhackdump


SVE-2023-0322(CVE-2023-30674): Improper configuration in Samsung Internet

Severity: Moderate
Resolved version: 21.0.0.41
Reported on: February 25, 2023
Description: Improper configuration in Samsung Internet prior to version 21.0.0.41 allows attacker to bypass SameSite Cookie.
The patch adds proper configuration.
Acknowledgement: Mohit Raj @shadow2639


SVE-2023-0752(CVE-2023-30676): Improper access control vulnerability in Samsung Pass

Severity: Moderate
Resolved version: 4.2.03.1
Reported on: April 30, 2023
Description: Improper access control vulnerability in Samsung Pass prior to version 4.2.03.1 allows physical attackers to access data of Samsung Pass.
The patch add proper access control.
Acknowledgement: Harsh Tyagi


PC Updates

SVE-2023-0312(CVE-2023-30673): Possible to delete arbitrary directory vulnerability in Smart Switch PC

Severity: Moderate
Resolved version: 4.3.23052_1
Reported on: February 23, 2023
Description: Improper validation of integrity check vulnerability in Smart Switch PC prior to version 4.3.23052_1 allows local attackers to delete arbitrary directory using directory junction.
The patch prevents directory junction in the directory used during installation process.
Acknowledgement: HeeChan Kim (@heegong123) of TeamH4C


SVE-2023-0310(CVE-2023-30672): Improper privilege management vulnerability in Samsung Smart Switch for Windows Installer

Severity: High
Resolved version: 4.3.23043_3
Reported on: February 23, 2023
Description: Improper privilege management vulnerability in Samsung Smart Switch for Windows Installer prior to version 4.3.23043_3 allows attackers to cause permanent DoS via directory junction.
The patch changes logic to prevent directory junction.
Acknowledgement: HeeChan Kim (@heegong123) of TeamH4C


Android Applications Updates

SVE-2023-0136(CVE-2023-21518): Improper access control vulnerability in SearchWidget

Severity: Moderate
Resolved version: 3.3
Reported on: January 17, 2023
Description: Improper access control vulnerability in SearchWidget prior to version 3.3 in China models allows untrusted applications to start arbitrary activity.
The patch changes logic to prevent arbitrary activity.
Acknowledgement: Stealth Assassin


Android Applications Updates

SVE-2022-2478(CVE-2023-21505): Improper access control in Samsung Core Service

Severity: Moderate
Resolved version: 2.1.00.36
Reported on: October 14, 2022
Description: Improper access control in Samsung Core Service prior to version 2.1.00.36 allows attacker to write arbitrary file in sandbox.
The patch add proper access control logic.
Acknowledgement: Stealth Assassin


SVE-2023-0313(CVE-2023-21506): Out-of-bounds Write vulnerability in bc_tui trustlet from Samsung Blockchain Keystore

Severity: Critical
Resolved version: 1.3.12.1 and SMR Jun-2023 Release 1
Reported on: February 23, 2023
Description: Out-of-bounds Write vulnerability while processing BC_TUI_CMD_SEND_RESOURCE_DATA_ARRAY command in bc_tui trustlet from Samsung Blockchain Keystore prior to version 1.3.12.1 and SMR Jun-2023 Release 1 allows local attacker to execute arbitrary code.
The patch adds proper boundary check to prevent arbitrary code execution.
Acknowledgement: Lumine, Markak, F4lt, and Kang from Certik Skyfall Team


SVE-2023-0348(CVE-2023-21507): Out-of-bounds Read vulnerability in bc_tui trustlet from Samsung Blockchain Keystore

Severity: Critical
Resolved version: 1.3.12.1 and SMR Jun-2023 Release 1
Reported on: March 1, 2023
Description: Out-of-bounds Read vulnerability while processing BC_TUI_CMD_SEND_RESOURCE_DATA_ARRAY command in bc_tui trustlet from Samsung Blockchain Keystore prior to version 1.3.12.1 and SMR Jun-2023 Release 1 allows local attacker to read arbitrary memory.
The patch adds proper boundary check to prevent arbitrary memory read.
Acknowledgement: Lumine, Markak, F4lt, and Kang from Certik Skyfall Team


SVE-2023-0361(CVE-2023-21508): Out-of-bounds Write vulnerability in bc_tui trustlet from Samsung Blockchain Keystore

Severity: Critical
Resolved version: 1.3.12.1 and SMR Jun-2023 Release 1
Reported on: March 3, 2023
Description: Out-of-bounds Write vulnerability while processing BC_TUI_CMD_SEND_RESOURCE_DATA command in bc_tui trustlet from Samsung Blockchain Keystore prior to version 1.3.12.1 and SMR Jun-2023 Release 1 allows local attacker to execute arbitrary code.
The patch adds proper boundary check to prevent arbitrary code execution.
Acknowledgement: Lumine, Markak, F4lt, and Kang from Certik Skyfall Team


SVE-2023-0365(CVE-2023-21509): Out-of-bounds Write vulnerability in bc_tui trustlet from Samsung Blockchain Keystore

Severity: Critical
Resolved version: 1.3.12.1 and SMR Jun-2023 Release 1
Reported on: March 4, 2023
Description: Out-of-bounds Write vulnerability while processing BC_TUI_CMD_UPDATE_SCREEN in bc_tui trustlet from Samsung Blockchain Keystore prior to version 1.3.12.1 and SMR Jun-2023 Release 1 allows local attacker to execute arbitrary code.
The patch adds proper boundary check to prevent arbitrary code execution.
Acknowledgement: Lumine, Markak, F4lt, and Kang from Certik Skyfall Team


SVE-2023-0369(CVE-2023-21510): Out-of-bounds Read vulnerability in bc_tui trustlet from Samsung Blockchain Keystore

Severity: High
Resolved version: 1.3.12.1 and SMR Jun-2023 Release 1
Reported on: March 5, 2023
Description: Out-of-bounds Read vulnerability while processing BC_TUI_CMD_UPDATE_SCREEN in bc_tui trustlet from Samsung Blockchain Keystore priosr to version 1.3.12.1 and SMR Jun-2023 Release 1 allows local attacker to read arbitrary memory.
The patch adds proper boundary check to prevent arbitrary memory read.
Acknowledgement: Lumine, Markak, F4lt, and Kang from Certik Skyfall Team


SVE-2023-0405(CVE-2023-21511): Out-of-bounds Read vulnerability in bc_core trustlet from Samsung Blockchain Keystore

Severity: High
Resolved version: 1.3.12.1 and SMR Jun-2023 Release 1
Reported on: March 9, 2023
Description: Out-of-bounds Read vulnerability while processing CMD_COLDWALLET_BTC_SET_PRV_UTXO in bc_core trustlet from Samsung Blockchain Keystore prior to version 1.3.12.1 and SMR Jun-2023 Release 1 allows local attacker to read arbitrary memory.
The patch adds proper boundary check to prevent arbitrary memory read.
Acknowledgement: Lumine, Markak, F4lt, and Kang from Certik Skyfall Team


Android Applications Updates

SVE-2022-2669(CVE-2023-21481): Improper URL input validation vulnerability in Samsung Account

Severity: High
Resolved version: 14.1.0.0
Reported on: November 10, 2022
Description: Improper URL input validation vulnerability in Samsung Account application prior to version 14.1.0.0 allows remote attackers to get sensitive information.
The patch adds proper URL input validation.
Acknowledgement: hackhackdump


SVE-2022-3068(CVE-2023-21482): Missing Authorization in Camera

Severity: Moderate
Resolved version: 11.1.02.18 in Android 11, 12.1.03.8 in Android 12 and 13.1.01.4 in Android 13
Reported on: December 30, 2022
Description: Missing authorization vulnerability in Camera prior to versions 11.1.02.18 in Android 11, 12.1.03.8 in Android 12 and 13.1.01.4 in Android 13 allows physical attackers to install package through Galaxy store before completion of Setup wizard.
The patch address to block entry point of the vulnerability.
Acknowledgement: SeungHyun Cho @netkingj


SVE-2023-0055(CVE-2023-21483): Improper Access Control vulnerability in Galaxy Store

Severity: Moderate
Resolved version: 4.5.53.6
Reported on: January 8, 2023
Description: Improper Access Control vulnerability in Galaxy Store prior to version 4.5.53.6 allows local attacker to access protected data using exported service.
The patch fixes incorrect implementation of unzip logic.
Acknowledgement: Dawuge of Pangu Team


Android Applications Updates

SVE-2022-2106(CVE-2023-21462): The sensitive information exposure vulnerability in Quick Share Agent

Severity: Moderate
Resolved version: 3.5.14.18 in Android 12 and 3.5.16.20 in Android 13
Reported on: September 3, 2022
Description: The sensitive information exposure vulnerability in Quick Share Agent prior to versions 3.5.14.18 in Android 12 and 3.5.16.20 in Android 13 allows to local attacker to access MAC address without related permission.
The patch addresses the data exposure in Quick Share Agent.
Acknowledgement: dg


SVE-2022-2304(CVE-2023-21463): Improper access control vulnerability in MyFiles application

Severity: Moderate
Resolved version: 12.2.09.0 in Android 11, 13.1.03.501 in Android 12 and 14.1.03.0 in Android 13
Reported on: September 18, 2022
Description: Improper access control vulnerability in MyFiles application prior to versions 12.2.09.0 in Android 11, 13.1.03.501 in Android 12 and 14.1.03.0 in Android 13 allows local attacker to get sensitive information of secret mode in Samsung Internet application with specific conditions.
The patch deletes temporary files properly to prevent sensitive information exposure.
Acknowledgement: Harsh Tyagi


SVE-2022-2610(CVE-2023-21465): Improper access control vulnerability in Bixby Touch

Severity: Moderate
Resolved version: 3.2.02.5
Reported on: November 3, 2022
Description: Improper access control vulnerability in BixbyTouch prior to version 3.2.02.5 in China models allows untrusted applications access local files.
The patch adds proper access control.
Acknowledgement: hackhackdump


SVE-2022-2744(CVE-2023-21464): Improper access control in Samsung Calendar

Severity: Moderate
Resolved version: 12.4.02.9000 in Android 13 and 12.3.08.2000 in Android 12
Reported on: November 22, 2022
Description: Improper access control in Samsung Calendar prior to versions 12.4.02.9000 in Android 13 and 12.3.08.2000 in Android 12 allows local attacker to configure improper status.
The patch removes unnecessary code.
Acknowledgement: hackhackdump


Android Applications Updates

SVE-2022-0696(CVE-2023-21441): Insufficient Verification of Data Authenticity vulnerability in Routine

Severity: Moderate
Resolved version: 2.6.30.6 in Android Q(10), 3.1.21.10 in Android R(11) and 3.5.2.23 in Android S(12)
Reported on: March 22, 2022
Description: Insufficient Verification of Data Authenticity vulnerability in Routine prior to versions 2.6.30.6 in Android Q(10), 3.1.21.10 in Android R(11) and 3.5.2.23 in Android S(12) allows local attacker to access protected files via unused code.
The patch deletes unused code.
Acknowledgement: Dawuge of Pangu Team


SVE-2022-1583(CVE-2023-21442): Improper access control vulnerability in Runestone application

Severity: Moderate
Resolved version: 2.9.09.003 in Android R(11) and 3.2.01.007 in Android S(12)
Reported on: June 29, 2022
Description: Improper access control vulnerability in Runestone application prior to version 2.9.09.003 in Android R(11) and 3.2.01.007 in Android S(12) allows local attackers to get device location information.
The patch adds an explicit intent to prevent improper access.
Acknowledgement: hsia.angsh


SVE-2022-2370(CVE-2023-21444, CVE-2023-21443): Improper cryptographic implementation in Samsung Flow

Severity: High
Resolved version: Samsung Flow for Android 4.9.04, Samsung Flow for Window 4.9.14.0
Reported on: September 27, 2022
Description: Improper cryptographic implementation in Samsung Flow for Android 4.9.04 and Samsung Flow for Window 4.9.14.0 allows adjacent attackers to decrypt encrypted messages or inject commands.
The patch adds proper cryptographic implementation.
Acknowledgement: Shai Shapira


SVE-2022-2398(CVE-2023-21445): Improper access control vulnerability in MyFiles

Severity: Moderate
Resolved version: 12.2.09 in Android R(11), 13.1.03.501 in Android S(12) and 14.1.00.422 in Android T(13)
Reported on: September 30, 2022
Description: Improper access control vulnerability in MyFiles prior to versions 12.2.09 in Android R(11), 13.1.03.501 in Android S(12) and 14.1.00.422 in Android T(13) allows local attacker to write file with MyFiles privilege via implicit intent.
The patch adds proper access control to use explicit intent.
Acknowledgement: Oversecured (oversecured.com)


SVE-2022-2399(CVE-2023-21446): Improper input validation in MyFiles

Severity: Moderate
Resolved version: 12.2.09 in Android R(11), 13.1.03.501 in Android S( 12) and 14.1.00.422 in Android T(13)
Reported on: September 30, 2022
Description: Improper input validation in MyFiles prior to version 12.2.09 in Android R(11), 13.1.03.501 in Android S( 12) and 14.1.00.422 in Android T(13) allows local attacker to access data of MyFiles.
The patch adds proper validation logic to prevent unauthorized access.
Acknowledgement: Oversecured (oversecured.com)


SVE-2022-2477(CVE-2023-21447): Improper access control vulnerabilities in Samsung Cloud

Severity: Moderate
Resolved version: 5.3.0.32
Reported on: October 14, 2022
Description: Improper access control vulnerabilities in Samsung Cloud prior to version 5.3.0.32 allows local attackers to access information with Samsung Cloud's privilege via implicit intent.
The patch adds proper access control.
Acknowledgement: Zhang Qing and Wang Kailong


SVE-2022-2585(CVE-2023-21448): Path traversal vulnerability in Samsung Cloud

Severity: Moderate
Resolved version: 5.3.0.32
Reported on: November 1, 2022
Description: Path traversal vulnerability in Samsung Cloud prior to version 5.3.0.32 allows attacker to access specific png file.
The patch adds proper validation logic to prevent access specific png file.
Acknowledgement: Dawuge of Pangu Team


SVE-2022-3019(CVE-2023-21450): Missing Authorization vulnerability in One Hand Operation +

Severity: Moderate
Resolved version: 6.1.21
Reported on: December 22, 2022
Description: Missing Authorization vulnerability in One Hand Operation + prior to version 6.1.21 allows multi-users to access owner's widget without authorization via gesture setting.
The patch blocks access One Hand Operation + contents for multi-user.
Acknowledgement: Louix Chazique


Android Applications Updates

SVE-2022-0884(CVE-2023-21431): Improper input validation in Bixby Vision

Severity: Moderate
Resolved version: 3.7.70.17
Reported on: April 8, 2022
Description: Improper input validation in Bixby Vision prior to version 3.7.70.17 allows attacker to access data of Bixby Vision.
The patch adds proper validation logic to prevent unauthorized access.
Acknowledgement: Oversecured (oversecured.com)


SVE-2022-1703(CVE-2023-21432): Improper access control vulnerabilities in Smart Things

Severity: Moderate
Resolved version: 1.7.93
Reported on: July 15, 2022
Description: Improper access control vulnerabilities in Smart Things prior to 1.7.93 allows to attacker to invite others without authorization of the owner.
The patch adds the proper validation of the owner location.
Acknowledgement: Martin Heyden


SVE-2022-2766(CVE-2023-21433): Improper access control vulnerability in Galaxy Store

Severity: High
Resolved version: 4.5.49.8
Reported on: November 25, 2022
Description: Improper access control vulnerability in Galaxy Store prior to version 4.5.49.8 allows local attackers to install applications from Galaxy Store.
The patch adds proper permission to prevent unauthorized access.
Acknowledgement: Ken Gannon


SVE-2022-2854(CVE-2023-21434): Improper input validation in Galaxy Store

Severity: Moderate
Resolved version: 4.5.49.8
Reported on: December 5, 2022
Description: Improper input validation vulnerability in Galaxy Store prior to version 4.5.49.8 allows local attackers to execute JavaScript by launching a web page.
The patch changes logic to prevent arbitrary web page execution.
Acknowledgement: Ken Gannon


SVE-2022-2902(CVE-2023-21514): Improper access control vulnerability in Galaxy Store

Severity: Critical
Resolved version: 4.5.49.8
Reported on: December 7, 2022
Description: Improper scheme validation from InstantPlay Deeplink in Galaxy Store prior to version 4.5.49.8 allows attackers to execute javascript API to install APK from Galaxy Store.
This vulnerability was patched by adding proper scheme check logic.
Acknowledgement: Chim working with Zero Day Initiative


SVE-2022-2910(CVE-2023-21515): Improper access control vulnerability in Galaxy Store

Severity: Critical
Resolved version: 4.5.49.8
Reported on: December 8, 2022
Description: InstantPlay which included vulnerable script which could execute javascript in Galaxy Store prior to version 4.5.49.8 allows attackers to execute javascript API to install APK from Galaxy Store.
This vulnerability was patched by adding proper URL validation logic.
Acknowledgement: Interrupt Labs working with Zero Day Initiative


SVE-2022-2916(CVE-2023-21516): Improper access control vulnerability in Galaxy Store

Severity: Critical
Resolved version: 4.5.49.8
Reported on: December 9, 2022
Description: XSS vulnerability from InstantPlay in Galaxy Store prior to version 4.5.49.8 allows attackers to execute javascript API to install APK from Galaxy Store.
This vulnerability was patched by adding proper URL validation logic.
Acknowledgement: Pentest working with Zero Day Initiative