CVE-2025-21078
BaseFortify
Publication date: 2025-11-05
Last updated on: 2025-11-07
Assigner: Samsung Mobile
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| samsung | smart_switch | to 3.7.68.6 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the use of an insufficiently random secretKey in Samsung Smart Switch versions prior to 3.7.68.6. Because the secretKey is not random enough, adjacent attackers can exploit this weakness to access backup data from applications.
How can this vulnerability impact me? :
An attacker who is adjacent (e.g., on the same network or physical proximity) could exploit the insufficient randomness of the secretKey to gain unauthorized access to backup data from applications, potentially leading to data theft, data integrity compromise, and loss of confidentiality, integrity, and availability of sensitive information.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update Smart Switch to version 3.7.68.6 or later, as versions prior to this use insufficiently random secretKey values that allow adjacent attackers to access backup data.