SB2026030344 - Multiple vulnerabilities in Samsung products
Published: March 3, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 12 secuirty vulnerabilities.
1) Improper access control (CVE-ID: CVE-2026-21002)
The vulnerability allows a local attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A local attacker can bypass implemented security restrictions and install arbitrary application on the target device.
2) Improper access control (CVE-ID: CVE-2026-21000)
The vulnerability allows a local attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A local attacker can bypass implemented security restrictions and install arbitrary application on the target device.
3) Improper access control (CVE-ID: CVE-2026-21001)
The vulnerability allows a local attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A local attacker can bypass implemented security restrictions and install arbitrary application on the target device.
4) Missing Authentication for Critical Function (CVE-ID: CVE-2026-20995)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to missing authentication for critical function. A remote attacker can install arbitrary application on the target device.
5) Missing Authentication for Critical Function (CVE-ID: CVE-2026-20996)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to missing authentication for critical function. A remote attacker can install arbitrary application on the target device.
6) Missing Authentication for Critical Function (CVE-ID: CVE-2026-20997)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to missing authentication for critical function. A remote attacker can install arbitrary application on the target device.
7) Missing Authentication for Critical Function (CVE-ID: CVE-2026-20998)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to missing authentication for critical function. A remote attacker can install arbitrary application on the target device.
8) Missing Authentication for Critical Function (CVE-ID: CVE-2026-20999)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to missing authentication for critical function. A remote attacker can install arbitrary application on the target device.
9) Path traversal (CVE-ID: CVE-2026-21005)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker on the local network can send a specially crafted HTTP request and overwrite arbitrary files with Smart Switch privilege.
10) Improper export of android application components (CVE-ID: CVE-2026-20993)
The vulnerability allows a local attacker to compromise the target system.
The vulnerability exists due to improper export of android application components. A local attacker can gain access to sensitive information.
11) Improper Authentication (CVE-ID: CVE-2026-21004)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to an error when processing authentication requests. A remote attacker on the local network can bypass authentication process and perform a denial of service (DoS) attack.
12) Open redirect (CVE-ID: CVE-2026-20994)
The vulnerability allows a remote attacker to redirect victims to arbitrary URL.
The vulnerability exists due to improper sanitization of user-supplied data. A remote attacker can create a link that leads to a trusted website, however, when clicked, redirects the victim to arbitrary domain.
Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information.
Remediation
Install update from vendor's website.