CVE-2025-4632

9.8 CRITICAL CISA KEV

📋 TL;DR

This vulnerability allows attackers to write arbitrary files with system-level privileges on Samsung MagicINFO 9 Server by exploiting improper pathname restrictions. Attackers can potentially achieve remote code execution or system compromise. Only systems running MagicINFO 9 Server versions before 21.1052 are affected.

💻 Affected Systems

Products:
  • Samsung MagicINFO 9 Server
Versions: All versions before 21.1052
Operating Systems: Windows Server (typically)
Default Config Vulnerable: ⚠️ Yes
Notes: MagicINFO servers are typically deployed in digital signage environments and may be exposed to internal networks or the internet for management.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining SYSTEM privileges, installing persistent backdoors, stealing credentials, and pivoting to other network resources.

🟠

Likely Case

Remote code execution leading to malware deployment, data exfiltration, or ransomware installation on affected MagicINFO servers.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation attempts from reaching vulnerable systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CISA has added this to their Known Exploited Vulnerabilities catalog, indicating active exploitation in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 21.1052 or later

Vendor Advisory: https://security.samsungtv.com/securityUpdates#SVP-MAY-2025

Restart Required: Yes

Instructions:

1. Download MagicINFO 9 Server version 21.1052 or later from Samsung's official site. 2. Backup current configuration and data. 3. Install the update following Samsung's installation guide. 4. Restart the server to complete the update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate MagicINFO servers from untrusted networks and restrict access to management interfaces.

Access Control Lists

all

Implement strict firewall rules to limit inbound connections to MagicINFO servers.

🧯 If You Can't Patch

  • Immediately isolate affected systems from production networks and internet access
  • Implement application whitelisting to prevent execution of unauthorized files

🔍 How to Verify

Check if Vulnerable:

Check MagicINFO Server version in the application's About section or system information panel.

Check Version:

Check via MagicINFO Server GUI: Help > About or system information panel

Verify Fix Applied:

Confirm version is 21.1052 or higher in the application interface and verify no unauthorized file writes occur.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file write operations in system directories
  • Unauthorized process execution with SYSTEM privileges
  • Failed authentication attempts followed by file operations

Network Indicators:

  • Unexpected outbound connections from MagicINFO servers
  • Traffic to known malicious IPs from MagicINFO systems

SIEM Query:

source="magicinfo" AND (event_type="file_write" AND target_path="system*" OR event_type="process_exec" AND user="SYSTEM")

🔗 References

📤 Share & Export