CVE-2025-54444

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload malicious files to Samsung MagicINFO 9 Server, leading to code injection and potential remote code execution. It affects all MagicINFO 9 Server installations running versions below 21.1080.0.

💻 Affected Systems

Products:
  • Samsung MagicINFO 9 Server
Versions: All versions less than 21.1080.0
Operating Systems: Windows Server (typically)
Default Config Vulnerable: ⚠️ Yes
Notes: MagicINFO is digital signage management software often deployed in enterprise environments with internet-facing interfaces.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with remote code execution, allowing attackers to take full control of the server, deploy ransomware, or pivot to internal networks.

🟠

Likely Case

Web shell deployment leading to data theft, credential harvesting, and lateral movement within the network.

🟢

If Mitigated

Limited impact with proper file upload restrictions and web application firewalls blocking malicious uploads.

🌐 Internet-Facing: HIGH - MagicINFO servers are often exposed to the internet for remote management, making them prime targets.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this, but external exposure increases overall risk.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unrestricted file upload vulnerabilities are commonly exploited with simple HTTP requests and readily available tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 21.1080.0 or later

Vendor Advisory: https://security.samsungtv.com/securityUpdates

Restart Required: Yes

Instructions:

1. Download MagicINFO 9 Server version 21.1080.0 or later from Samsung's official portal. 2. Backup current configuration. 3. Install the update following Samsung's installation guide. 4. Restart the server.

🔧 Temporary Workarounds

Restrict File Upload Types

all

Configure web application firewall or server rules to block uploads of executable file types.

Network Segmentation

all

Isolate MagicINFO server from critical networks and restrict inbound connections.

🧯 If You Can't Patch

  • Implement strict file upload validation at the application layer
  • Deploy web application firewall with file upload protection rules

🔍 How to Verify

Check if Vulnerable:

Check MagicINFO Server version in administration panel or About section. If version is below 21.1080.0, system is vulnerable.

Check Version:

Check via MagicINFO web interface: Admin → System Information → Version

Verify Fix Applied:

Confirm version is 21.1080.0 or higher in administration panel and test file upload functionality with restricted file types.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to MagicINFO endpoints
  • POST requests with file uploads to unexpected paths
  • Execution of uploaded files from web directories

Network Indicators:

  • HTTP POST requests with file uploads to MagicINFO server
  • Outbound connections from MagicINFO server to unknown IPs

SIEM Query:

source="magicinfo" AND (http_method="POST" AND uri_path CONTAINS "upload" OR "file")

🔗 References

📤 Share & Export