SB20251114106 - Multiple vulnerabilities in Samsung Mobile Firmware (April 2025)
Published: November 14, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 43 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2025-22439)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
2) Out-of-bounds read (CVE-ID: CVE-2024-53150)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the DESC_LENGTH_CHECK(), validate_clock_source() and validate_clock_selector() functions in sound/usb/clock.c. A local user can perform a denial of service (DoS) attack.
3) Out-of-bounds write (CVE-ID: CVE-2024-53197)
The vulnerability allows a local user to compromise the affected system.
The vulnerability exists due to an out-of-bounds write error within the snd_usb_create_quirk(), snd_usb_extigy_boot_quirk(), mbox2_setup_48_24_magic() and snd_usb_mbox2_boot_quirk() functions in sound/usb/quirks.c. A local user can trigger an out-of-bounds write and execute arbitrary code on the system.
Note, the vulnerability is being actively exploited against Android devices.
4) Use After Free (CVE-ID: CVE-2024-49848)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to improper input validation in DSP Service. A local privileged application can execute arbitrary code.
5) Information exposure (CVE-ID: CVE-2024-49728)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.
6) Improper Validation of Array Index (CVE-ID: CVE-2024-53014)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Audio. A local application can execute arbitrary code.
7) Integer overflow (CVE-ID: CVE-2024-53025)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in BT Controller. A local application can perform a denial of service (DoS) attack.
8) Buffer overflow (CVE-ID: CVE-2024-53027)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN Host. A remote attacker can perform a denial of service (DoS) attack.
9) Improper input validation (CVE-ID: CVE-2025-22418)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
10) Improper input validation (CVE-ID: CVE-2025-22419)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
11) Improper input validation (CVE-ID: CVE-2025-22433)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
12) Out-of-bounds write (CVE-ID: CVE-2025-21042)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error in libimagecodec.quram.so. A remote attacker can create a specially crafted image file, trick the victim into opening it, trigger an out-of-bounds write and execute arbitrary code on the target system.
Note, the vulnerability is being actively exploited in the wild.
13) Improper input validation (CVE-ID: CVE-2025-22435)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
14) Improper input validation (CVE-ID: CVE-2025-22428)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
15) Information exposure (CVE-ID: CVE-2025-22429)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.
16) Out-of-bounds write (CVE-ID: CVE-2025-20645)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to a missing bounds check within KeyInstall. A local application can execute arbitrary code.
17) Improper input validation (CVE-ID: CVE-2025-26416)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
18) Improper input validation (CVE-ID: CVE-2025-22423)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the System component. A local application can perform a denial of service (DoS) attack.
19) Weak Authentication (CVE-ID: CVE-2024-45551)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation in HLOS. A local application can gain access to sensitive information.
20) Off-by-one (CVE-ID: CVE-2024-46852)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an off-by-one error within the cma_heap_vm_fault() function in drivers/dma-buf/heaps/cma_heap.c. A local user can perform a denial of service (DoS) attack.
21) Improper Authorization (CVE-ID: CVE-2024-43051)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation in SPS-HLOS. A local application can gain access to sensitive information.
22) State Issues (CVE-ID: CVE-2025-22413)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to an error in KVM implementation of the PSCI state handling. A local application can gain access to sensitive information.
23) Improper Validation of Array Index (CVE-ID: CVE-2024-49836)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Camera. A local application can execute arbitrary code.
24) Buffer over-read (CVE-ID: CVE-2024-49838)
The vulnerability allows a remote attacker to read and manipulate data.
The vulnerability exists due to improper input validation in WLAN HOST. A remote attacker can read and manipulate data.
25) Memory leak (CVE-ID: CVE-2024-50302)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the hid_alloc_report_buf() function in drivers/hid/hid-core.c. A local user can perform a denial of service (DoS) attack.
Note, the vulnerability is being actively exploited in the wild against Android devices.
26) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2024-53011)
The vulnerability allows a local privileged application to read and manipulate data.
The vulnerability exists due to improper input validation in Video Analytics and Processing. A local privileged application can read and manipulate data.
27) NULL Pointer Dereference (CVE-ID: CVE-2024-53024)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Display. A local application can execute arbitrary code.
28) Improper Validation of Syntactic Correctness of Input (CVE-ID: CVE-2025-20644)
The vulnerability allows a local application to perform service disruption.
The vulnerability exists due to incorrect error handling within Modem. A local application can perform service disruption.
29) Improper input validation (CVE-ID: CVE-2025-22416)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
30) Improper input validation (CVE-ID: CVE-2025-22427)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
31) Improper input validation (CVE-ID: CVE-2025-22417)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
32) Improper input validation (CVE-ID: CVE-2025-22422)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
33) Improper input validation (CVE-ID: CVE-2025-22434)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
34) Improper input validation (CVE-ID: CVE-2025-22437)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
35) Improper input validation (CVE-ID: CVE-2025-22438)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
36) Improper input validation (CVE-ID: CVE-2025-22442)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
37) Information exposure (CVE-ID: CVE-2024-49722)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.
38) Information exposure (CVE-ID: CVE-2025-22421)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.
39) Information exposure (CVE-ID: CVE-2025-22430)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.
40) Improper input validation (CVE-ID: CVE-2025-22431)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.
41) Improper input validation (CVE-ID: CVE-2024-40653)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
42) Improper input validation (CVE-ID: CVE-2024-49720)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
43) Improper input validation (CVE-ID: CVE-2024-49730)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
Remediation
Install update from vendor's website.