CVE-2023-21433

7.8 HIGH

📋 TL;DR

This vulnerability allows local attackers to bypass Galaxy Store's access controls and install applications without proper authorization. It affects Samsung Galaxy devices with Galaxy Store versions prior to 4.5.49.8. The attacker must have physical access to the device or local execution capabilities.

💻 Affected Systems

Products:
  • Samsung Galaxy Store
Versions: Versions prior to 4.5.49.8
Operating Systems: Android (Samsung devices)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Samsung Galaxy devices with vulnerable Galaxy Store versions. Requires local access to device.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious actor with physical device access installs malware or spyware that compromises user data, enables remote control, or bricks the device.

🟠

Likely Case

Local attacker installs unwanted applications, potentially leading to adware, data theft, or privilege escalation.

🟢

If Mitigated

Proper access controls prevent unauthorized installations, limiting impact to denial of service if attacker attempts exploitation.

🌐 Internet-Facing: LOW - Requires local access; not remotely exploitable over network.
🏢 Internal Only: HIGH - Local attackers with device access can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to device. No public exploit code identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.5.49.8 and later

Vendor Advisory: https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=01

Restart Required: No

Instructions:

1. Open Galaxy Store app. 2. Go to Settings > About Galaxy Store. 3. Check for updates. 4. Install update to version 4.5.49.8 or later. 5. Alternatively, update through device's system updates.

🔧 Temporary Workarounds

Disable Galaxy Store

android

Temporarily disable Galaxy Store app to prevent exploitation

adb shell pm disable-user --user 0 com.sec.android.app.samsungapps

Restrict physical access

all

Implement physical security controls to prevent unauthorized device access

🧯 If You Can't Patch

  • Implement strict physical security controls for devices
  • Monitor for suspicious app installations and disable Galaxy Store if possible

🔍 How to Verify

Check if Vulnerable:

Check Galaxy Store version in app settings (Settings > About Galaxy Store). If version is below 4.5.49.8, device is vulnerable.

Check Version:

adb shell dumpsys package com.sec.android.app.samsungapps | grep versionName

Verify Fix Applied:

Confirm Galaxy Store version is 4.5.49.8 or higher in app settings.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected app installations via Galaxy Store
  • Failed access control attempts in system logs

Network Indicators:

  • Unusual download activity from Galaxy Store servers

SIEM Query:

source="android_system" AND "package installed" AND "Galaxy Store" AND version<"4.5.49.8"

🔗 References

📤 Share & Export