CVE-2025-54438

9.8 CRITICAL

📋 TL;DR

This path traversal vulnerability in Samsung MagicINFO 9 Server allows attackers to upload malicious web shell files to the web server directory. Attackers can achieve remote code execution by exploiting improper path validation. All MagicINFO 9 Server installations below version 21.1080.0 are affected.

💻 Affected Systems

Products:
  • Samsung MagicINFO 9 Server
Versions: All versions less than 21.1080.0
Operating Systems: Windows Server (typical deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: MagicINFO is typically deployed on Windows Server environments for digital signage management.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with persistent backdoor access, data exfiltration, lateral movement to other systems, and potential ransomware deployment.

🟠

Likely Case

Unauthorized web shell upload leading to remote code execution, data theft, and system manipulation.

🟢

If Mitigated

Attack blocked at network perimeter or detected before successful exploitation.

🌐 Internet-Facing: HIGH - Web servers are typically internet-facing, making them prime targets for automated scanning and exploitation.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal vulnerabilities are commonly exploited with simple HTTP requests. The high CVSS score suggests trivial exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 21.1080.0 or later

Vendor Advisory: https://security.samsungtv.com/securityUpdates

Restart Required: Yes

Instructions:

1. Download MagicINFO 9 Server version 21.1080.0 or later from Samsung's official portal. 2. Backup current configuration and data. 3. Run the installer to upgrade. 4. Restart the server. 5. Verify the new version is running.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to MagicINFO server to only trusted IP addresses/networks

Use firewall rules to allow only specific source IPs to TCP ports 80/443

Web Application Firewall

all

Deploy WAF with path traversal protection rules

Configure WAF to block requests containing '../', '..\', or similar traversal patterns

🧯 If You Can't Patch

  • Isolate the MagicINFO server in a dedicated network segment with strict inbound/outbound firewall rules
  • Implement file integrity monitoring on web directories and alert on unauthorized file uploads

🔍 How to Verify

Check if Vulnerable:

Check MagicINFO Server version in the admin interface or via 'About' section. If version is below 21.1080.0, system is vulnerable.

Check Version:

Check via MagicINFO admin web interface at http(s)://[server-ip]/admin -> System Information

Verify Fix Applied:

Confirm version is 21.1080.0 or higher in the admin interface. Test file upload functionality with traversal attempts.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' or '..\' patterns in file upload parameters
  • Unexpected file creation in web directories (especially .jsp, .php, .aspx files)
  • Unusual process execution from web server directories

Network Indicators:

  • HTTP POST requests to file upload endpoints with encoded traversal sequences
  • Outbound connections from web server to unknown external IPs

SIEM Query:

source="web_server_logs" AND (uri="*../*" OR uri="*..\\*" OR params="*../*" OR params="*..\\*")

🔗 References

📤 Share & Export