CVE-2025-54446

9.8 CRITICAL

📋 TL;DR

This path traversal vulnerability in Samsung MagicINFO 9 Server allows attackers to upload malicious web shell files to restricted directories. Successful exploitation enables remote code execution on affected servers. All MagicINFO 9 Server installations below version 21.1080.0 are vulnerable.

💻 Affected Systems

Products:
  • Samsung MagicINFO 9 Server
Versions: All versions less than 21.1080.0
Operating Systems: Windows Server (typically)
Default Config Vulnerable: ⚠️ Yes
Notes: MagicINFO servers are typically deployed as digital signage management systems in enterprise environments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with persistent backdoor installation, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Web shell deployment leading to unauthorized system access, data manipulation, and potential ransomware deployment.

🟢

If Mitigated

Limited impact with proper network segmentation and file integrity monitoring detecting unauthorized file uploads.

🌐 Internet-Facing: HIGH - Directly exploitable via web interface without authentication.
🏢 Internal Only: HIGH - Even internal systems are vulnerable to authenticated or network-accessible attackers.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal vulnerabilities are commonly weaponized. The high CVSS score suggests trivial exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 21.1080.0 or later

Vendor Advisory: https://security.samsungtv.com/securityUpdates

Restart Required: Yes

Instructions:

1. Download MagicINFO 9 Server version 21.1080.0 or later from Samsung's official portal. 2. Backup current configuration and data. 3. Run the installer to upgrade. 4. Restart the server and verify functionality.

🔧 Temporary Workarounds

Network Access Restriction

windows

Restrict network access to MagicINFO server using firewall rules

# Example Windows Firewall rule: New-NetFirewallRule -DisplayName "Block MagicINFO External" -Direction Inbound -LocalPort 80,443 -Protocol TCP -Action Block

File Upload Directory Hardening

windows

Set strict permissions on web upload directories

icacls "C:\Program Files\MagicINFO\web\uploads" /deny Everyone:(OI)(CI)(W)
# Adjust path based on actual installation

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate MagicINFO servers from critical systems
  • Deploy web application firewall (WAF) with path traversal protection rules

🔍 How to Verify

Check if Vulnerable:

Check MagicINFO Server version in administration console or via 'About' section in web interface

Check Version:

Check via MagicINFO web interface at http://[server-ip]/admin or review installed programs in Windows

Verify Fix Applied:

Confirm version is 21.1080.0 or higher and test file upload functionality with traversal attempts

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to web directories
  • HTTP requests containing '../' sequences
  • New executable files in web directories

Network Indicators:

  • HTTP POST requests with path traversal patterns to upload endpoints
  • Unexpected outbound connections from MagicINFO server

SIEM Query:

source="magicinfo_logs" AND ("../" OR "..\\" OR "%2e%2e%2f")

🔗 References

📤 Share & Export