CVE-2025-54440

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload malicious files to Samsung MagicINFO 9 Server, which can lead to code execution on the server. It affects all MagicINFO 9 Server installations running versions below 21.1080.0. Attackers can exploit this without authentication to take control of affected systems.

💻 Affected Systems

Products:
  • Samsung MagicINFO 9 Server
Versions: All versions less than 21.1080.0
Operating Systems: Windows Server (typically)
Default Config Vulnerable: ⚠️ Yes
Notes: MagicINFO is digital signage management software often deployed in enterprise environments with internet-facing interfaces.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to ransomware deployment, data exfiltration, or use as a pivot point into internal networks.

🟠

Likely Case

Web shell installation allowing persistent access, data theft, and further lateral movement within the network.

🟢

If Mitigated

File upload attempts blocked at perimeter with proper file type validation and WAF rules in place.

🌐 Internet-Facing: HIGH - Directly exploitable without authentication via web interface.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unrestricted file upload vulnerabilities are commonly exploited and weaponization is likely given the high CVSS score and unauthenticated nature.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 21.1080.0 or later

Vendor Advisory: https://security.samsungtv.com/securityUpdates

Restart Required: Yes

Instructions:

1. Download MagicINFO 9 Server version 21.1080.0 or later from Samsung's official site. 2. Backup current configuration and data. 3. Install the update following Samsung's installation guide. 4. Restart the server to apply changes.

🔧 Temporary Workarounds

Implement Web Application Firewall Rules

all

Block file upload requests to vulnerable endpoints and restrict file types at the network perimeter.

Restrict Network Access

all

Limit access to MagicINFO server to only trusted IP addresses using firewall rules.

🧯 If You Can't Patch

  • Isolate the MagicINFO server in a dedicated network segment with strict egress filtering
  • Implement application-level file type validation and size restrictions

🔍 How to Verify

Check if Vulnerable:

Check MagicINFO Server version in the web interface admin panel or via the installed software list in Windows.

Check Version:

Not applicable - check via web interface at http(s)://[server-ip]:[port]/admin

Verify Fix Applied:

Confirm version is 21.1080.0 or higher in the MagicINFO admin interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload activity in web server logs
  • POST requests to file upload endpoints with suspicious file extensions
  • Execution of unexpected processes by web server user

Network Indicators:

  • HTTP POST requests with file uploads to MagicINFO endpoints
  • Outbound connections from MagicINFO server to unknown external IPs

SIEM Query:

source="web_server_logs" AND (uri_path="*upload*" OR uri_path="*file*" OR method="POST") AND (user_agent="*curl*" OR user_agent="*wget*" OR file_extension="*.php" OR file_extension="*.jsp" OR file_extension="*.asp")

🔗 References

📤 Share & Export