CVE-2025-21071
BaseFortify
Publication date: 2025-11-05
Last updated on: 2025-11-07
Assigner: Samsung Mobile
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 14.0 |
| samsung | android | 15.0 |
| samsung | android | 15.0 |
| samsung | android | 15.0 |
| samsung | android | 15.0 |
| samsung | android | 15.0 |
| samsung | android | 15.0 |
| samsung | android | 15.0 |
| samsung | android | 15.0 |
| samsung | android | 15.0 |
| samsung | android | 16.0 |
| samsung | android | 16.0 |
| samsung | android | 16.0 |
| samsung | android | 16.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an out-of-bounds write issue in the handling of an opcode within the fingerprint trustlet component prior to the SMR Nov-2025 Release 1. It allows local attackers with privileged access to write data outside the intended memory boundaries, potentially leading to memory corruption.
How can this vulnerability impact me? :
An attacker with local privileged access could exploit this vulnerability to corrupt memory, which may lead to unauthorized modification of data or system instability. This could compromise the confidentiality and integrity of sensitive information handled by the fingerprint trustlet.