Samsung Security Vulnerabilities (CVEs)
Track 413 security vulnerabilities affecting Samsung products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
This CVE describes an intent redirection vulnerability in Samsung's SecSettings application that allows attackers to access arbitrary files with syste...
Sep 3, 2025This vulnerability allows a local attacker to write data beyond allocated memory boundaries in Samsung's libaudiosaplus_sec.so library, potentially le...
Sep 3, 2025This vulnerability allows local attackers on Samsung devices to access location information without proper authorization. It affects Samsung devices r...
Sep 3, 2025This vulnerability in Samsung's SemClipboard service allows attackers to bypass access controls and read arbitrary files with system-level permissions...
Sep 3, 2025This vulnerability allows a physical attacker with USB access to execute arbitrary code in the bootloader of Samsung Exynos devices due to improper in...
Sep 3, 2025This vulnerability allows a physical attacker with USB access to execute arbitrary code in the bootloader of Samsung devices with Exynos chipsets. It ...
Sep 3, 2025This vulnerability in Samsung Exynos baseband chips allows incorrect handling of unencrypted messages due to a 3GPP specification implementation error...
Sep 3, 2025This vulnerability allows attackers to bypass access controls in Samsung's Telephony framework, potentially accessing sensitive files with elevated pe...
Sep 3, 2025This vulnerability allows local attackers on Samsung devices to access location information through improper access control in the SLocation service. ...
Sep 3, 2025This CVE describes a PendingIntent hijacking vulnerability in Samsung's CertificatePolicy framework component that allows local attackers to bypass co...
Sep 3, 2025This vulnerability allows attackers to gain SYSTEM privileges on Windows systems by exploiting insecure file deletion during Samsung Magician updates....
Sep 2, 2025A buffer overflow vulnerability in Samsung Exynos processors allows attackers to execute arbitrary code or cause denial of service via specially craft...
Sep 2, 2025This vulnerability allows local privileged attackers to perform out-of-bounds memory writes in the detaching crypto box component of Blockchain Keysto...
Aug 6, 2025CVE-2025-21018 is an out-of-bounds read vulnerability in Blockchain Keystore that allows local privileged attackers to read memory beyond allocated bo...
Aug 6, 2025An improper authorization vulnerability in Samsung Health allows local attackers to access sensitive health data stored in the application. This affec...
Aug 6, 2025This vulnerability allows local privileged attackers to write out-of-bounds memory when creating bitmap images in Blockchain Keystore. It affects syst...
Aug 6, 2025This vulnerability allows local privileged attackers to write out-of-bounds memory in the drawing pinpad component of Blockchain Keystore. Attackers w...
Aug 6, 2025A path traversal vulnerability in Samsung's Document scanner allows local attackers to delete arbitrary files with the application's elevated privileg...
Aug 6, 2025This vulnerability allows local attackers to bypass access controls and read device identifiers on Samsung mobile devices. It affects Samsung devices ...
Aug 6, 2025A privilege management vulnerability in SamsungAccount allows local attackers with elevated privileges to deactivate Samsung accounts on affected devi...
Aug 6, 2025This vulnerability in Samsung's Emergency SoS feature allows local attackers to access sensitive information due to improper export of an Android appl...
Aug 6, 2025This vulnerability in Samsung Exynos mobile processors allows attackers to write data beyond allocated memory boundaries when processing JPEG images. ...
Aug 4, 2025CVE-2025-53082 is an arbitrary file deletion vulnerability in Samsung DMS that allows attackers to delete files from unintended filesystem locations. ...
Jul 29, 2025This path traversal vulnerability in Samsung DMS allows authenticated attackers to write arbitrary files to unintended filesystem locations. Attackers...
Jul 29, 2025An execution after redirect vulnerability in Samsung DMS allows attackers to execute limited functions without proper permissions, potentially comprom...
Jul 29, 2025This vulnerability in Samsung DMS allows attackers to execute arbitrary code by exploiting insecure deserialization of untrusted data. Attackers can w...
Jul 29, 2025This vulnerability allows attackers to upload malicious files to Samsung MagicINFO 9 Server, leading to code injection and potential remote code execu...
Jul 23, 2025This path traversal vulnerability in Samsung MagicINFO 9 Server allows attackers to escape restricted directories and inject malicious code. It affect...
Jul 23, 2025This CVE describes a code injection vulnerability in Samsung MagicINFO 9 Server that allows attackers to execute arbitrary code on affected systems. T...
Jul 23, 2025This path traversal vulnerability in Samsung MagicINFO 9 Server allows attackers to access files outside the intended directory, potentially leading t...
Jul 23, 2025This vulnerability allows attackers to bypass authentication in Samsung MagicINFO 9 Server by exploiting hard-coded credentials. It affects all MagicI...
Jul 23, 2025This vulnerability allows attackers to upload malicious files to Samsung MagicINFO 9 Server, which can lead to remote code execution. It affects all M...
Jul 23, 2025This vulnerability allows attackers to upload malicious files to Samsung MagicINFO 9 Server, leading to code injection and potential remote code execu...
Jul 23, 2025This path traversal vulnerability in Samsung MagicINFO 9 Server allows attackers to upload malicious web shell files to restricted directories. Succes...
Jul 23, 2025This vulnerability allows attackers to upload malicious files to Samsung MagicINFO 9 Server, which can lead to code execution on the server. It affect...
Jul 23, 2025This path traversal vulnerability in Samsung MagicINFO 9 Server allows attackers to upload malicious web shell files to the web server directory. Atta...
Jul 23, 2025An improper access control vulnerability in the isemtelephony component on Android devices allows local attackers to access sensitive information. Thi...
Jul 8, 2025This vulnerability allows local attackers to write out-of-bounds memory in the MPEG4 codec handling within libsavsvc.so on Android devices. It affects...
Jul 8, 2025This vulnerability allows local attackers to cause memory corruption via an out-of-bounds read in the libsavsvc.so library when decoding frame headers...
Jul 8, 2025This vulnerability allows local attackers to reset certain configuration settings on Galaxy Watch devices due to incorrect default permissions. It aff...
Jul 8, 2025This vulnerability allows secondary users on Samsung Galaxy Tablets to access the primary owner's saved Wi-Fi passwords due to improper authorization ...
Jul 8, 2025This vulnerability allows local attackers to stop Auracast broadcasting on Samsung devices due to improper access control in LeAudioService. It affect...
Jul 8, 2025This vulnerability allows local attackers to access sensitive information stored insecurely in the Emergency SOS feature on Samsung devices. It affect...
Jul 8, 2025This vulnerability allows local privileged attackers to write out-of-bounds memory in the KnoxVault trustlet, potentially leading to memory corruption...
Jul 8, 2025A missing length check in Samsung Exynos 2400 and Modem 5400 chips allows attackers to cause denial of service via malformed PDCP packets. This affect...
Jul 7, 2025An out-of-bounds read vulnerability in Samsung's rLottie animation library (version 0.2) allows attackers to read memory beyond allocated buffers. Thi...
Jun 30, 2025CVE-2025-53075 is a path traversal vulnerability in Samsung's rLottie animation library that allows attackers to read arbitrary files on the system. T...
Jun 30, 2025A Use After Free vulnerability in Samsung's rLottie animation library allows remote attackers to execute arbitrary code by exploiting memory corruptio...
Jun 30, 2025A use-after-free vulnerability in Samsung Exynos 2200, 1480, and 2400 mobile processors allows local attackers to escalate privileges. This affects de...
Jun 4, 2025A double free vulnerability in Samsung Exynos mobile processors allows local attackers to escalate privileges on affected devices. This affects smartp...
Jun 4, 2025Why Monitor Samsung Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 413+ known vulnerabilities affecting Samsung products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Samsung packages in under 60 seconds. No agents required - completely agentless scanning that works across Samsung deployments.
Free vulnerability database: Access detailed information about every Samsung CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Samsung CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions