
Cloud Vulnerability DB
A community-led vulnerabilities database
An improper access control vulnerability was discovered in Samsung's TelephonyUI application prior to SMR MAY-2021 Release 1. The vulnerability, tracked as CVE-2021-25397, allows local attackers to write arbitrary files of telephony process via untrusted applications (NVD, AttackerKB).
The vulnerability exists in the receiver component com.samsung.android.app.telephonyui.carrierui.photoring.model.PhotoringReceiver, which is exported. The vulnerability allows attackers to save files from a specified URL to an arbitrary path. The only requirement for exploitation is that the content-type of the server response should be image/ or video/ (Oversecured Blog).
The vulnerability could allow attackers to overwrite the file storing SMS/MMS messages with malicious content, potentially leading to data manipulation and unauthorized access to sensitive information (Hacker News, Oversecured Blog).
Samsung addressed this vulnerability in the SMR MAY-2021 Release 1 security update. Users are recommended to update their devices to the latest available firmware version to protect against this vulnerability (Samsung Mobile Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."