Samsung Implements Security Patch for CVE-2025-4632 Exploited in Mirai Botnet Deployment via MagicINFO 9 Vulnerability

مقالات

Samsung has implemented software updates to rectify a critical security vulnerability identified in the MagicINFO 9 Server, which has been the target of active exploitation.

This vulnerability, designated as CVE-2025-4632 with a CVSS score of 9.8, is characterized as a path traversal flaw. According to security advisories, the vulnerability enables improper limitation of a pathname to a restricted directory, allowing attackers to write arbitrary files with system authority.

It is important to highlight that CVE-2025-4632 represents a patch bypass for another path traversal vulnerability, CVE-2024-7399, which had been addressed by Samsung in August 2024. The newly identified flaw has already been exploited in the wild, following the public release of a proof-of-concept (PoC) by SSD Disclosure on April 30, 2025. In certain cases, this exploitation has reportedly facilitated the deployment of the Mirai botnet.

Initially, it was believed that attackers were targeting CVE-2024-7399; however, cybersecurity firm Huntress recently discovered the existence of an additional, unpatched vulnerability. Their investigations revealed signs of exploitation even on instances of the MagicINFO 9 Server using the latest version (21.1050).

In a subsequent report dated May 9, Huntress documented three separate incidents of exploitation involving CVE-2025-4632. In these incidents, unidentified actors executed a consistent set of commands to download various payloads, including “srvany.exe” and “services.exe,” across two hosts, while deploying reconnaissance commands on a third.

For users operating the Samsung MagicINFO 9 Server, it is strongly recommended to implement the latest updates without delay to protect against potential threats.

Experts have confirmed that the version MagicINFO 9 21.1052.0 effectively mitigates the issues presented by CVE-2025-4632. However, any systems currently running versions v8 or v9 below 21.1050.0 remain vulnerable. Additionally, transitioning from MagicINFO v8 to v9 21.1052.0 is complex; users must first upgrade to version 21.1050.0 before installing the final patch.