Samsung Addresses CVE-2025-4632, Exploited in the Wild for Mirai Botnet Deployment Through MagicINFO 9 Vulnerability

May 14, 2025
Vulnerability / Malware

Samsung has issued software updates to fix a critical security vulnerability in MagicINFO 9 Server that has been actively targeted. Identified as CVE-2025-4632 (CVSS score: 9.8), this path traversal flaw allows attackers to write arbitrary files with system-level permissions. According to the advisory, the vulnerability arises from “improper limitation of a pathname to a restricted directory” in versions before 21.1052 of the MagicINFO 9 Server. Notably, CVE-2025-4632 serves as a patch bypass for a previously addressed vulnerability, CVE-2024-7399, which was mitigated by Samsung in August 2024. Shortly after a proof-of-concept was released by SSD Disclosure on April 30, 2025, CVE-2025-4632 began to be exploited in the wild, with reports of it being used to deploy the Mirai botnet. Initial investigations into these attacks mistakenly pointed to CVE-2024-7399, but cybersecurity firm Huntress later clarified the situation.

Samsung Addresses Critical Vulnerability in MagicINFO 9 Server Used by Attackers

May 14, 2025

In a significant security update, Samsung has released patches to address a critical vulnerability identified as CVE-2025-4632, which affects the MagicINFO 9 Server. This vulnerability, which scores a staggering 9.8 on the Common Vulnerability Scoring System (CVSS), is classified as a path traversal flaw. The advisory from Samsung details that the issue arises from an improper restriction of pathnames to designated directories, enabling unauthorized users to write arbitrary files with system-level privileges.

The origin of CVE-2025-4632 appears to be a patch bypass for a related vulnerability, CVE-2024-7399, which was previously fixed by Samsung in August 2024. Following the release of a proof-of-concept exploit by SSD Disclosure on April 30, 2025, this new vulnerability was quickly exploited in the wild. Reports indicate that attackers have utilized this flaw to deploy the notorious Mirai botnet, demonstrating its potential for widespread impact.

While initial assessments suggested that the attacks might focus solely on the earlier CVE-2024-7399, cybersecurity firm Huntress has brought to light the extent of the exploitation surrounding CVE-2025-4632. This highlights a concerning trend in cybersecurity, where vulnerabilities can be iteratively exploited even after patches have been applied.

The targets of these attacks include organizations utilizing the MagicINFO 9 Server, which is prevalent among sectors relying on digital signage and multimedia management. Given that Samsung is a global technology provider, the affected user base is likely to be diverse, including numerous enterprises based in the United States.

Analyzing the tactics and techniques employed during these attacks through the lens of the MITRE ATT&CK framework, it is evident that adversaries utilized several key strategies. Initial access would typically involve exploiting the path traversal vulnerability to gain unauthorized access to the system. Subsequently, the attackers may have implemented persistence techniques to maintain their foothold within the affected environment, allowing for ongoing control over the compromised systems.

Privilege escalation is another critical component of these attacks, especially given that the vulnerability permits file writing with system authority. Once access has been gained, adversaries can deploy malware, such as the Mirai botnet, which is designed to recruit compromised devices into a larger network for abusive purposes. This underscores the importance for organizations to implement robust security measures and remain vigilant following patch releases.

As cybersecurity threats evolve, it remains crucial for businesses to stay informed about vulnerabilities and the corresponding patches. The exploitation of CVE-2025-4632 serves as a reminder of the ongoing risks associated with software vulnerabilities and the necessity for prompt action following updates from vendors like Samsung. Business owners must prioritize a proactive cybersecurity posture to safeguard their critical assets against potential threats.

Source link