Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Samsung Zero-Day Vulnerability Actively Exploited to Execute Remote Code

Samsung Zero-Day Vulnerability Actively Exploited to Execute Remote Code

Posted on September 12, 2025September 12, 2025 By CWS

Samsung has launched its September 2025 safety replace, addressing a vital zero-day vulnerability that’s being actively exploited within the wild.

The patch resolves a complete of 25 Samsung Vulnerabilities and Exposures (SVEs), alongside fixes from Google and Samsung Semiconductor, to safeguard Galaxy units in opposition to a variety of safety threats.

Customers are strongly urged to put in the replace instantly to guard their units from potential distant code execution assaults.

Samsung Patches Actively Exploited Zero-Day

Probably the most extreme flaw addressed on this replace is tracked as CVE-2025-21043, a vital out-of-bounds write vulnerability within the libimagecodec.quram.so library. This vulnerability impacts units working Android variations 13, 14, 15, and 16.

A profitable exploit might permit a distant attacker to execute arbitrary code on a susceptible gadget, seemingly by tricking the consumer into processing a specifically crafted picture.

Samsung has confirmed that an exploit for this challenge already exists, elevating the urgency for customers to use the patch.

The safety groups at Meta and WhatsApp privately disclosed the vulnerability. The patch corrects the inaccurate implementation that led to the flaw.

The September Safety Upkeep Launch (SMR) additionally contains patches for 2 different high-severity vulnerabilities. The primary, CVE-2025-32100, was famous within the bulletin with out particular particulars however is rated as excessive severity.

One other important repair, recognized as CVE-2025-21034, addresses an out-of-bounds write vulnerability within the libsavsvc.so library.

This flaw might permit an area attacker to execute arbitrary code, posing a critical danger if a malicious utility is already current on the gadget.

The patch mitigates this risk by including correct enter validation to stop reminiscence corruption.

Fixes And Replace Particulars

Past the vital and high-severity points, the replace resolves quite a few moderate-severity vulnerabilities throughout numerous system elements.

These embody improper entry management flaws in One UI House (CVE-2025-21032) that might let a bodily attacker bypass Kiosk mode, and a flaw in ContactProvider (CVE-2025-21033) permitting native attackers to entry delicate info.

Different patches deal with points within the ImsService that might result in name interruption or non permanent SIM disabling. The safety replace, designated SMR Sep-2025 Launch 1, will roll out to supported Galaxy smartphones and tablets within the coming weeks.

Customers can examine for the replace by navigating to Settings > Software program replace > Obtain and set up.

Discover this Story Attention-grabbing! Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates.

Cyber Security News Tags:Actively, Code, Execute, Exploited, Remote, Samsung, Vulnerability, ZeroDay

Post navigation

Previous Post: K2 Think AI Model Jailbroken Within Hours After The Release
Next Post: In Other News: $900k for XSS Bugs, HybridPetya Malware, Burger King Censors Research

Related Posts

Attacker Context and Historical iOS Zero-Click Similarities Attacker Context and Historical iOS Zero-Click Similarities Cyber Security News
Developers Beware! 16 React Native Packages With Million of Download Compromised Overnight Developers Beware! 16 React Native Packages With Million of Download Compromised Overnight Cyber Security News
Hacktivist Groups Attacks on Critical ICS Systems to Steal Sensitive Data Hacktivist Groups Attacks on Critical ICS Systems to Steal Sensitive Data Cyber Security News
Handala Hacker Group Attacking Israeli High-Tech and Aerospace Professionals Handala Hacker Group Attacking Israeli High-Tech and Aerospace Professionals Cyber Security News
Microsoft Teams to Allow Users Adding Agents and Bots With Their Current Conversation Microsoft Teams to Allow Users Adding Agents and Bots With Their Current Conversation Cyber Security News
Hackers Imitate OneNote Login to Steal Office365 & Outlook Credentials Hackers Imitate OneNote Login to Steal Office365 & Outlook Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark