Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Samsung Zero-Day Vulnerability Actively Exploited to Execute Remote Code

Posted on September 12, 2025September 12, 2025 By CWS

Samsung has launched its September 2025 safety replace, addressing a vital zero-day vulnerability that’s being actively exploited within the wild.

The patch resolves a complete of 25 Samsung Vulnerabilities and Exposures (SVEs), alongside fixes from Google and Samsung Semiconductor, to safeguard Galaxy units in opposition to a variety of safety threats.

Customers are strongly urged to put in the replace instantly to guard their units from potential distant code execution assaults.

Samsung Patches Actively Exploited Zero-Day

Probably the most extreme flaw addressed on this replace is tracked as CVE-2025-21043, a vital out-of-bounds write vulnerability within the libimagecodec.quram.so library. This vulnerability impacts units working Android variations 13, 14, 15, and 16.

A profitable exploit might permit a distant attacker to execute arbitrary code on a susceptible gadget, seemingly by tricking the consumer into processing a specifically crafted picture.

Samsung has confirmed that an exploit for this challenge already exists, elevating the urgency for customers to use the patch.

The safety groups at Meta and WhatsApp privately disclosed the vulnerability. The patch corrects the inaccurate implementation that led to the flaw.

The September Safety Upkeep Launch (SMR) additionally contains patches for 2 different high-severity vulnerabilities. The primary, CVE-2025-32100, was famous within the bulletin with out particular particulars however is rated as excessive severity.

One other important repair, recognized as CVE-2025-21034, addresses an out-of-bounds write vulnerability within the libsavsvc.so library.

This flaw might permit an area attacker to execute arbitrary code, posing a critical danger if a malicious utility is already current on the gadget.

The patch mitigates this risk by including correct enter validation to stop reminiscence corruption.

Fixes And Replace Particulars

Past the vital and high-severity points, the replace resolves quite a few moderate-severity vulnerabilities throughout numerous system elements.

These embody improper entry management flaws in One UI House (CVE-2025-21032) that might let a bodily attacker bypass Kiosk mode, and a flaw in ContactProvider (CVE-2025-21033) permitting native attackers to entry delicate info.

Different patches deal with points within the ImsService that might result in name interruption or non permanent SIM disabling. The safety replace, designated SMR Sep-2025 Launch 1, will roll out to supported Galaxy smartphones and tablets within the coming weeks.

Customers can examine for the replace by navigating to Settings > Software program replace > Obtain and set up.

Discover this Story Attention-grabbing! Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates.

Cyber Security News Tags:Actively, Code, Execute, Exploited, Remote, Samsung, Vulnerability, ZeroDay

Post navigation

Previous Post: K2 Think AI Model Jailbroken Within Hours After The Release
Next Post: In Other News: $900k for XSS Bugs, HybridPetya Malware, Burger King Censors Research

Related Posts

Threat Actors Abuse Adtech Companies to Target Users With Malicious Ads Cyber Security News
Attacks on Palo Alto PAN-OS Global Protect Login Portals Surge from 2,200 IPs Cyber Security News
SetupHijack Tool Exploits Race Conditions and Insecure File Handling in Windows Installer Processes Cyber Security News
Microsoft Exchange Server Vulnerabilities Let Attackers Spoof and Tamper Over Network Cyber Security News
Writable File in Lenovo’s Windows Directory Enables a Stealthy AppLocker Bypass Cyber Security News
New Tykit Phishing Kit Mimics Microsoft 365 Login Pages to Steal Corporate Account Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Merging FileFix and Cache Smuggling Attacks to Evade Security Controls
  • New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves
  • New GhostGrab Android Malware Silently Steals Banking Login Details and Intercept SMS for OTPs
  • Stragglers From Myanmar Scam Center Raided by Army Cross Into Thailand as Buildings are Blown Up
  • BlueNoroff Hackers Adopts New Infiltration Strategies To Attack C-Level Executives, and Managers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Merging FileFix and Cache Smuggling Attacks to Evade Security Controls
  • New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves
  • New GhostGrab Android Malware Silently Steals Banking Login Details and Intercept SMS for OTPs
  • Stragglers From Myanmar Scam Center Raided by Army Cross Into Thailand as Buildings are Blown Up
  • BlueNoroff Hackers Adopts New Infiltration Strategies To Attack C-Level Executives, and Managers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News