SB2025091260 - Multiple vulnerabilities in Samsung Mobile Firmware (September 2025)
Published: September 12, 2025 Updated: February 6, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 52 secuirty vulnerabilities.
1) NULL pointer dereference (CVE-ID: CVE-2025-21755)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the __vsock_release() function in net/vmw_vsock/af_vsock.c. A local user can perform a denial of service (DoS) attack.
2) Cryptographic Issues (CVE-ID: CVE-2025-21482)
The vulnerability allows a local application to read and manipulate data.
The vulnerability exists due to improper input validation in Core. A local application can read and manipulate data.
3) Improper Access Control Applied to Mirrored or Aliased Memory Regions (CVE-ID: CVE-2025-27032)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Hypervisor. A local application can execute arbitrary code.
4) Race condition (CVE-ID: CVE-2025-38352)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition within the run_posix_cpu_timers() function in kernel/time/posix-cpu-timers.c. A local user can escalate privileges on the system.
Note, the vulnerability is being actively exploited in the wild against Android devices.
5) Race condition (CVE-ID: CVE-2025-021701)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition in net/ethtool/netlink.c. A local user can exploit the race and escalate privileges on the system.
6) Release of invalid pointer or reference (CVE-ID: CVE-2025-47329)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Android Core. A local application can execute arbitrary code.
7) Buffer over-read (CVE-ID: CVE-2025-47326)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN HAL. A remote attacker can perform a denial of service (DoS) attack.
8) Buffer over-read (CVE-ID: CVE-2025-47328)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN HAL. A remote attacker can perform a denial of service (DoS) attack.
9) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2024-7881)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improperly imposed security restrictions. An unprivileged context can trigger a data memory-dependent prefetch engine to fetch the contents of a privileged location. A local user or process can read privileged data and escalate privileges on the system.
10) Out-of-bounds write (CVE-ID: CVE-2025-21043)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input within libimagecodec.quram.so. A remote attacker can trick the victim into opening a specially crafted image file, trigger an out-of-bounds write and execute arbitrary code on the target system.
Note, the vulnerability is being actively exploited in the wild.
11) Improper access control (CVE-ID: CVE-2025-21031)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to improper access restrictions in ImsService. A local application can gain unauthorized access to privileged APIs.
12) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2025-21030)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to improperly imposed security restrictions in AppPrelaunchManagerService in Chinese Android 15 firmware. A local application can escalate privileges on the system.
13) Incorrect default permissions (CVE-ID: CVE-2025-21029)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to incorrect default permissions for files and folders that are set by the in System UI. A local application can send arbitrary replies to messages from the cover display.
14) Incorrect default permissions (CVE-ID: CVE-2025-21028)
The vulnerability allows a local application to bypass implemented security restrictions.
The vulnerability exists due to incorrect default permissions in ThemeManager. A local application can reuse trial items.
15) Out-of-bounds write (CVE-ID: CVE-2025-20708)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input within the Modem component. A remote attacker with control over a rogue base station can send specially crafted packets to the device, trigger an out-of-bounds write and execute arbitrary code on the target system.
16) Out-of-bounds read (CVE-ID: CVE-2025-20703)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition within the Modem component. A remote attacker with control over a rogue base station can send specially crafted packets to trigger an out-of-bounds read error and perform a denial of service (DoS) attack.
17) Improper input validation (CVE-ID: CVE-2025-48534)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the System component. A local application can perform a denial of service (DoS) attack.
18) Improper input validation (CVE-ID: CVE-2025-48539)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code.
19) Improper input validation (CVE-ID: CVE-2025-48553)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
20) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2025-48560)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.
21) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2025-48545)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.
22) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2025-48537)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.
23) Improper input validation (CVE-ID: CVE-2025-48563)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
24) Improper input validation (CVE-ID: CVE-2025-48558)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
25) Improper input validation (CVE-ID: CVE-2025-48556)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
26) Improper input validation (CVE-ID: CVE-2025-48552)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
27) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2025-48562)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.
28) Improper input validation (CVE-ID: CVE-2025-48549)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
29) Improper input validation (CVE-ID: CVE-2025-48548)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
30) Improper input validation (CVE-ID: CVE-2025-48546)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
31) Improper input validation (CVE-ID: CVE-2025-48540)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
32) Improper input validation (CVE-ID: CVE-2025-0089)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
33) Improper input validation (CVE-ID: CVE-2025-48543)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Android Runtime ART component. A local application can escalate privileges on the system.
Note, the vulnerability is being exploited in the wild.
34) Improper Validation of Array Index (CVE-ID: CVE-2025-27034)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to improper input validation in Multi-Mode Call Processor. A remote attacker can execute arbitrary code.
35) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2025-48561)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.
36) Improper input validation (CVE-ID: CVE-2025-48538)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.
37) Improper input validation (CVE-ID: CVE-2025-48524)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the System component. A local application can perform a denial of service (DoS) attack.
38) Improper input validation (CVE-ID: CVE-2025-48535)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
39) Exposure of sensitive information to an unauthorized actor (CVE-ID: CVE-2025-48551)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.
40) Improper input validation (CVE-ID: CVE-2025-48581)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
41) Improper input validation (CVE-ID: CVE-2025-48547)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
42) Improper input validation (CVE-ID: CVE-2025-48544)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
43) Improper input validation (CVE-ID: CVE-2025-48541)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
44) Improper input validation (CVE-ID: CVE-2025-48532)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
45) Improper input validation (CVE-ID: CVE-2025-48542)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.
46) Improper input validation (CVE-ID: CVE-2025-32327)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
47) Improper input validation (CVE-ID: CVE-2025-32323)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
48) Improper input validation (CVE-ID: CVE-2025-26464)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
49) Improper input validation (CVE-ID: CVE-2023-40130)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
50) Improper input validation (CVE-ID: CVE-2025-48559)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.
51) Improper input validation (CVE-ID: CVE-2025-48554)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.
52) Improper input validation (CVE-ID: CVE-2025-48550)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.