Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2023-30738 |
CWE-ID | CWE-20 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Galaxy Book Client/Desktop applications / File managers, FTP clients Galaxy Book Pro Client/Desktop applications / File managers, FTP clients Galaxy Book Pro 360 Client/Desktop applications / File managers, FTP clients Galaxy Book Odyssey Client/Desktop applications / File managers, FTP clients |
Vendor |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU81469
Risk: Low
CVSSv3.1: 7.3 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-30738
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in UEFI Firmware. A local attacker can pass specially crafted input to the application and execute SMM memory corruption.
MitigationInstall updates from vendor's website.
Vulnerable software versionsGalaxy Book: before Oct-2023
Galaxy Book Pro: before Oct-2023
Galaxy Book Pro 360: before Oct-2023
Galaxy Book Odyssey: before Oct-2023
External linkshttp://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=10
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.