SB2025091260 - Multiple vulnerabilities in Samsung Mobile Firmware (September 2025)



SB2025091260 - Multiple vulnerabilities in Samsung Mobile Firmware (September 2025)

Published: September 12, 2025 Updated: February 6, 2026

Security Bulletin ID SB2025091260
Severity
Critical
Patch available
YES
Number of vulnerabilities 52
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 2% High 10% Medium 6% Low 83%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 52 secuirty vulnerabilities.


1) NULL pointer dereference (CVE-ID: CVE-2025-21755)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference within the __vsock_release() function in net/vmw_vsock/af_vsock.c. A local user can perform a denial of service (DoS) attack.


2) Cryptographic Issues (CVE-ID: CVE-2025-21482)

The vulnerability allows a local application to read and manipulate data.

The vulnerability exists due to improper input validation in Core. A local application can read and manipulate data.


3) Improper Access Control Applied to Mirrored or Aliased Memory Regions (CVE-ID: CVE-2025-27032)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Hypervisor. A local application can execute arbitrary code.


4) Race condition (CVE-ID: CVE-2025-38352)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the run_posix_cpu_timers() function in kernel/time/posix-cpu-timers.c. A local user can escalate privileges on the system.

Note, the vulnerability is being actively exploited in the wild against Android devices.


5) Race condition (CVE-ID: CVE-2025-021701)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition in net/ethtool/netlink.c. A local user can exploit the race and escalate privileges on the system.


6) Release of invalid pointer or reference (CVE-ID: CVE-2025-47329)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Android Core. A local application can execute arbitrary code.


7) Buffer over-read (CVE-ID: CVE-2025-47326)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN HAL. A remote attacker can perform a denial of service (DoS) attack.


8) Buffer over-read (CVE-ID: CVE-2025-47328)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN HAL. A remote attacker can perform a denial of service (DoS) attack.


9) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2024-7881)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improperly imposed security restrictions. An unprivileged context can trigger a data memory-dependent prefetch engine to fetch the contents of a privileged location. A local user or process can read  privileged data and escalate privileges on the system.


10) Out-of-bounds write (CVE-ID: CVE-2025-21043)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input within libimagecodec.quram.so. A remote attacker can trick the victim into opening a specially crafted image file, trigger an out-of-bounds write and execute arbitrary code on the target system.

Note, the vulnerability is being actively exploited in the wild. 


11) Improper access control (CVE-ID: CVE-2025-21031)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to improper access restrictions in ImsService. A local application can gain unauthorized access to privileged APIs.


12) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2025-21030)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to improperly imposed security restrictions in AppPrelaunchManagerService in Chinese Android 15 firmware. A local application can escalate privileges on the system.


13) Incorrect default permissions (CVE-ID: CVE-2025-21029)

The vulnerability allows a local application to bypass implemented security restrictions. 

The vulnerability exists due to incorrect default permissions for files and folders that are set by the in System UI. A local application can send arbitrary replies to messages from the cover display.


14) Incorrect default permissions (CVE-ID: CVE-2025-21028)

The vulnerability allows a local application to bypass implemented security restrictions. 

The vulnerability exists due to incorrect default permissions in ThemeManager. A local application can reuse trial items.


15) Out-of-bounds write (CVE-ID: CVE-2025-20708)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input within the Modem component. A remote attacker with control over a rogue base station can send specially crafted packets to the device, trigger an out-of-bounds write and execute arbitrary code on the target system.


16) Out-of-bounds read (CVE-ID: CVE-2025-20703)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition within the Modem component. A remote attacker with control over a rogue base station can send specially crafted packets to trigger an out-of-bounds read error and perform a denial of service (DoS) attack.


17) Improper input validation (CVE-ID: CVE-2025-48534)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the System component. A local application can perform a denial of service (DoS) attack.


18) Improper input validation (CVE-ID: CVE-2025-48539)

The vulnerability allows a remote attacker to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code.


19) Improper input validation (CVE-ID: CVE-2025-48553)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


20) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2025-48560)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.


21) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2025-48545)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.


22) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2025-48537)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.


23) Improper input validation (CVE-ID: CVE-2025-48563)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


24) Improper input validation (CVE-ID: CVE-2025-48558)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


25) Improper input validation (CVE-ID: CVE-2025-48556)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


26) Improper input validation (CVE-ID: CVE-2025-48552)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


27) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2025-48562)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.


28) Improper input validation (CVE-ID: CVE-2025-48549)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


29) Improper input validation (CVE-ID: CVE-2025-48548)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


30) Improper input validation (CVE-ID: CVE-2025-48546)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


31) Improper input validation (CVE-ID: CVE-2025-48540)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


32) Improper input validation (CVE-ID: CVE-2025-0089)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


33) Improper input validation (CVE-ID: CVE-2025-48543)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Android Runtime ART component. A local application can escalate privileges on the system.

Note, the vulnerability is being exploited in the wild. 


34) Improper Validation of Array Index (CVE-ID: CVE-2025-27034)

The vulnerability allows a remote attacker to execute arbitrary code.

The vulnerability exists due to improper input validation in Multi-Mode Call Processor. A remote attacker can execute arbitrary code.


35) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2025-48561)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.


36) Improper input validation (CVE-ID: CVE-2025-48538)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.


37) Improper input validation (CVE-ID: CVE-2025-48524)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the System component. A local application can perform a denial of service (DoS) attack.


38) Improper input validation (CVE-ID: CVE-2025-48535)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


39) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2025-48551)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.


40) Improper input validation (CVE-ID: CVE-2025-48581)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


41) Improper input validation (CVE-ID: CVE-2025-48547)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


42) Improper input validation (CVE-ID: CVE-2025-48544)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


43) Improper input validation (CVE-ID: CVE-2025-48541)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


44) Improper input validation (CVE-ID: CVE-2025-48532)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


45) Improper input validation (CVE-ID: CVE-2025-48542)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.


46) Improper input validation (CVE-ID: CVE-2025-32327)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


47) Improper input validation (CVE-ID: CVE-2025-32323)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


48) Improper input validation (CVE-ID: CVE-2025-26464)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


49) Improper input validation (CVE-ID: CVE-2023-40130)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


50) Improper input validation (CVE-ID: CVE-2025-48559)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.


51) Improper input validation (CVE-ID: CVE-2025-48554)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.


52) Improper input validation (CVE-ID: CVE-2025-48550)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.