CVE-2025-54450
📋 TL;DR
This path traversal vulnerability in Samsung MagicINFO 9 Server allows attackers to escape restricted directories and inject malicious code. It affects all MagicINFO 9 Server installations running versions below 21.1080.0, potentially compromising the entire server.
💻 Affected Systems
- Samsung MagicINFO 9 Server
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full server compromise leading to remote code execution, data theft, and lateral movement within the network
Likely Case
Unauthorized file access, configuration modification, and potential code execution on the MagicINFO server
If Mitigated
Limited to directory traversal attempts that are blocked by proper input validation
🎯 Exploit Status
Path traversal vulnerabilities typically have low exploitation complexity once the vulnerable endpoint is identified
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 21.1080.0 or later
Vendor Advisory: https://security.samsungtv.com/securityUpdates
Restart Required: Yes
Instructions:
1. Download MagicINFO 9 Server version 21.1080.0 or later from Samsung's official portal. 2. Backup current configuration and data. 3. Run the installer to upgrade. 4. Restart the server and verify functionality.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to MagicINFO server to only trusted management systems
Web Application Firewall Rules
allBlock path traversal patterns in web requests
WAF rule to block requests containing '../', '..\', or similar traversal sequences
🧯 If You Can't Patch
- Implement strict network access controls to limit who can reach the MagicINFO server
- Monitor for suspicious file access patterns and directory traversal attempts in server logs
🔍 How to Verify
Check if Vulnerable:
Check MagicINFO Server version in the application interface or Windows Programs and Features
Check Version:
Check MagicINFO Server About dialog or Windows registry at HKEY_LOCAL_MACHINE\SOFTWARE\Samsung\MagicINFO\Version
Verify Fix Applied:
Confirm version is 21.1080.0 or higher and test directory traversal attempts are blocked
📡 Detection & Monitoring
Log Indicators:
- HTTP requests containing '../', '..\', or encoded traversal sequences
- Unusual file access patterns outside expected directories
Network Indicators:
- HTTP requests with path traversal payloads to MagicINFO endpoints
- Unexpected outbound connections from MagicINFO server
SIEM Query:
source="magicinfo_logs" AND (http_uri="*../*" OR http_uri="*..\\*")