Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Samsung Zero-Day Vulnerability Actively Exploited to Execute Remote Code

Posted on September 12, 2025September 12, 2025 By CWS

Samsung has launched its September 2025 safety replace, addressing a vital zero-day vulnerability that’s being actively exploited within the wild.

The patch resolves a complete of 25 Samsung Vulnerabilities and Exposures (SVEs), alongside fixes from Google and Samsung Semiconductor, to safeguard Galaxy units in opposition to a variety of safety threats.

Customers are strongly urged to put in the replace instantly to guard their units from potential distant code execution assaults.

Samsung Patches Actively Exploited Zero-Day

Probably the most extreme flaw addressed on this replace is tracked as CVE-2025-21043, a vital out-of-bounds write vulnerability within the libimagecodec.quram.so library. This vulnerability impacts units working Android variations 13, 14, 15, and 16.

A profitable exploit might permit a distant attacker to execute arbitrary code on a susceptible gadget, seemingly by tricking the consumer into processing a specifically crafted picture.

Samsung has confirmed that an exploit for this challenge already exists, elevating the urgency for customers to use the patch.

The safety groups at Meta and WhatsApp privately disclosed the vulnerability. The patch corrects the inaccurate implementation that led to the flaw.

The September Safety Upkeep Launch (SMR) additionally contains patches for 2 different high-severity vulnerabilities. The primary, CVE-2025-32100, was famous within the bulletin with out particular particulars however is rated as excessive severity.

One other important repair, recognized as CVE-2025-21034, addresses an out-of-bounds write vulnerability within the libsavsvc.so library.

This flaw might permit an area attacker to execute arbitrary code, posing a critical danger if a malicious utility is already current on the gadget.

The patch mitigates this risk by including correct enter validation to stop reminiscence corruption.

Fixes And Replace Particulars

Past the vital and high-severity points, the replace resolves quite a few moderate-severity vulnerabilities throughout numerous system elements.

These embody improper entry management flaws in One UI House (CVE-2025-21032) that might let a bodily attacker bypass Kiosk mode, and a flaw in ContactProvider (CVE-2025-21033) permitting native attackers to entry delicate info.

Different patches deal with points within the ImsService that might result in name interruption or non permanent SIM disabling. The safety replace, designated SMR Sep-2025 Launch 1, will roll out to supported Galaxy smartphones and tablets within the coming weeks.

Customers can examine for the replace by navigating to Settings > Software program replace > Obtain and set up.

Discover this Story Attention-grabbing! Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates.

Cyber Security News Tags:Actively, Code, Execute, Exploited, Remote, Samsung, Vulnerability, ZeroDay

Post navigation

Previous Post: K2 Think AI Model Jailbroken Within Hours After The Release
Next Post: In Other News: $900k for XSS Bugs, HybridPetya Malware, Burger King Censors Research

Related Posts

Infamous BreachForums Is Back Online With All Accounts and Posts Restored Cyber Security News
PoC Published For Fortinet 0-Day Vulnerability That Being Exploited in the Wild Cyber Security News
How Simple Prompts Can Lead to Major Breaches Cyber Security News
Strengthening Security Measures In Digital Advertising Platforms Cyber Security News
Warlock Ransomware Exploiting SharePoint Vulnerabilities to Gain Access and Steal Credentials Cyber Security News
Microsoft Teams New Meeting Join Bar Reminds You to Join Meeting On-time Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News