SB2026030344 - Multiple vulnerabilities in Samsung products



SB2026030344 - Multiple vulnerabilities in Samsung products

Published: March 3, 2026

Security Bulletin ID SB2026030344
Severity
High
Patch available
YES
Number of vulnerabilities 12
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 42% Medium 25% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 12 secuirty vulnerabilities.


1) Improper access control (CVE-ID: CVE-2026-21002)

The vulnerability allows a local attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A local attacker can bypass implemented security restrictions and install arbitrary application on the target device.


2) Improper access control (CVE-ID: CVE-2026-21000)

The vulnerability allows a local attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A local attacker can bypass implemented security restrictions and install arbitrary application on the target device.


3) Improper access control (CVE-ID: CVE-2026-21001)

The vulnerability allows a local attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A local attacker can bypass implemented security restrictions and install arbitrary application on the target device.


4) Missing Authentication for Critical Function (CVE-ID: CVE-2026-20995)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to missing authentication for critical function. A remote attacker can install arbitrary application on the target device.


5) Missing Authentication for Critical Function (CVE-ID: CVE-2026-20996)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to missing authentication for critical function. A remote attacker can install arbitrary application on the target device.


6) Missing Authentication for Critical Function (CVE-ID: CVE-2026-20997)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to missing authentication for critical function. A remote attacker can install arbitrary application on the target device.


7) Missing Authentication for Critical Function (CVE-ID: CVE-2026-20998)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to missing authentication for critical function. A remote attacker can install arbitrary application on the target device.


8) Missing Authentication for Critical Function (CVE-ID: CVE-2026-20999)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to missing authentication for critical function. A remote attacker can install arbitrary application on the target device.


9) Path traversal (CVE-ID: CVE-2026-21005)

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker on the local network can send a specially crafted HTTP request and overwrite arbitrary files with Smart Switch privilege.


10) Improper export of android application components (CVE-ID: CVE-2026-20993)

The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to improper export of android application components. A local attacker can gain access to sensitive information.


11) Improper Authentication (CVE-ID: CVE-2026-21004)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error when processing authentication requests. A remote attacker on the local network can bypass authentication process and perform a denial of service (DoS) attack.


12) Open redirect (CVE-ID: CVE-2026-20994)

The vulnerability allows a remote attacker to redirect victims to arbitrary URL.

The vulnerability exists due to improper sanitization of user-supplied data. A remote attacker can create a link that leads to a trusted website, however, when clicked, redirects the victim to arbitrary domain.

Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information.


Remediation

Install update from vendor's website.