INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global supply_chain Software Development and Technology CRITICAL 1h Global apt Multiple sectors HIGH 3h Global general Digital Content & Intellectual Property MEDIUM 3h Global malware Technology and Software Development CRITICAL 4h Global ddos Technology and Social Media HIGH 4h Global phishing Financial Services, Telecommunications, General Public HIGH 4h Global supply_chain Software Development and Technology CRITICAL 6h Global apt Multiple sectors / Critical Infrastructure CRITICAL 6h Global malware Financial Services CRITICAL 6h Global general Software/Technology LOW 6h Global supply_chain Software Development and Technology CRITICAL 1h Global apt Multiple sectors HIGH 3h Global general Digital Content & Intellectual Property MEDIUM 3h Global malware Technology and Software Development CRITICAL 4h Global ddos Technology and Social Media HIGH 4h Global phishing Financial Services, Telecommunications, General Public HIGH 4h Global supply_chain Software Development and Technology CRITICAL 6h Global apt Multiple sectors / Critical Infrastructure CRITICAL 6h Global malware Financial Services CRITICAL 6h Global general Software/Technology LOW 6h Global supply_chain Software Development and Technology CRITICAL 1h Global apt Multiple sectors HIGH 3h Global general Digital Content & Intellectual Property MEDIUM 3h Global malware Technology and Software Development CRITICAL 4h Global ddos Technology and Social Media HIGH 4h Global phishing Financial Services, Telecommunications, General Public HIGH 4h Global supply_chain Software Development and Technology CRITICAL 6h Global apt Multiple sectors / Critical Infrastructure CRITICAL 6h Global malware Financial Services CRITICAL 6h Global general Software/Technology LOW 6h
Vulnerabilities

CVE-2021-25369

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Samsung Mobile Devices Improper Access Control Vulnerability — Samsung mobile devices using Mali GPU contains an improper access control vulnerability in sec_log file. Exploitation of the vulnerabilit
Published: Nov 8, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Samsung Mobile Devices Improper Access Control Vulnerability — Samsung mobile devices using Mali GPU contains an improper access control vulnerability in sec_log file. Exploitation of the vulnerability exposes sensitive kernel information to the userspace. This vulnerability was chained with CVE-2021-25337 and CVE-2021-25370.

🤖 AI Executive Summary

CVE-2021-25369 is a critical improper access control vulnerability in Samsung mobile devices' Mali GPU driver that exposes sensitive kernel information to unprivileged userspace processes. With a CVSS score of 9.0 and publicly available exploits, this vulnerability poses an immediate threat to confidentiality and can be chained with other CVEs for privilege escalation attacks. Samsung has released patches, but widespread adoption remains critical given the large installed base of affected devices in Saudi Arabia.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 20, 2026 06:38
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability significantly impacts Saudi Arabia's mobile-dependent sectors, particularly banking and financial services where Samsung devices are prevalent for mobile banking and transaction processing. Government agencies using Samsung devices for secure communications face risks of kernel information disclosure. Telecommunications sector (STC, Mobily, Zain) is affected as both service providers and users. Healthcare sector utilizing Samsung devices for patient data access and telemedicine faces confidentiality breaches. The vulnerability's chainability with CVE-2021-25337 and CVE-2021-25370 enables complete device compromise, making it particularly dangerous for organizations handling sensitive data.
🏢 Affected Saudi Sectors
Banking and Financial Services Government and Public Administration Telecommunications Healthcare and Medical Services Energy and Utilities Retail and E-commerce Education
⚖️ Saudi Risk Score (AI)
8.7
/ 10.0
🔧 Remediation Steps (English)
Immediate Actions:
1. Identify all Samsung mobile devices in your organization and create an inventory by model and Android version
2. Disable Mali GPU access for non-essential applications through device management policies
3. Restrict userspace access to /proc/sec_log and similar kernel debug interfaces via SELinux policies
4. Implement mobile device management (MDM) solutions to enforce security policies

Patching Guidance:
1. Check Samsung Security Updates page for your device model and apply latest security patches immediately
2. Prioritize devices handling sensitive data (banking, government, healthcare)
3. For devices no longer receiving updates, consider device replacement or retirement
4. Test patches in non-production environment before enterprise rollout

Compensating Controls:
1. Implement strict application whitelisting to prevent malicious apps from accessing GPU drivers
2. Enable SELinux in enforcing mode to restrict kernel information exposure
3. Deploy mobile threat defense (MTD) solutions to detect exploitation attempts
4. Monitor for suspicious kernel information access patterns
5. Implement network segmentation to limit lateral movement if device is compromised
6. Use containerization/Knox security features to isolate sensitive applications

Detection Rules:
1. Monitor for unauthorized access to /proc/sec_log and /sys/kernel/debug paths
2. Alert on Mali GPU driver ioctl calls from unprivileged processes
3. Track privilege escalation attempts following kernel information disclosure
4. Monitor for CVE-2021-25337 and CVE-2021-25370 exploitation indicators
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع أجهزة سامسونج المحمولة في مؤسستك وإنشاء قائمة جرد حسب الموديل وإصدار Android
2. تعطيل وصول Mali GPU للتطبيقات غير الأساسية من خلال سياسات إدارة الأجهزة
3. تقييد وصول userspace إلى /proc/sec_log والواجهات المماثلة من خلال سياسات SELinux
4. تنفيذ حلول إدارة أجهزة الجوال (MDM) لفرض سياسات الأمان

إرشادات التصحيح:
1. تحقق من صفحة تحديثات أمان سامسونج لموديل جهازك وطبق أحدث التصحيحات الأمنية فوراً
2. أعط الأولوية للأجهزة التي تتعامل مع بيانات حساسة (البنوك والحكومة والرعاية الصحية)
3. بالنسبة للأجهزة التي لم تعد تتلقى تحديثات، فكر في استبدال الجهاز أو إيقافه
4. اختبر التصحيحات في بيئة غير الإنتاج قبل النشر على مستوى المؤسسة

الضوابط البديلة:
1. تنفيذ قائمة بيضاء صارمة للتطبيقات لمنع التطبيقات الضارة من الوصول إلى محركات GPU
2. تفعيل SELinux في وضع الفرض لتقييد كشف معلومات النواة
3. نشر حلول الدفاع ضد التهديدات المحمولة (MTD) للكشف عن محاولات الاستغلال
4. مراقبة الأنماط المريبة للوصول إلى معلومات النواة
5. تنفيذ تقسيم الشبكة لتحديد الحركة الجانبية إذا تم اختراق الجهاز
6. استخدام ميزات الحاويات/Knox الأمنية لعزل التطبيقات الحساسة

قواعد الكشف:
1. مراقبة الوصول غير المصرح به إلى مسارات /proc/sec_log و /sys/kernel/debug
2. تنبيه استدعاءات Mali GPU driver ioctl من العمليات غير المميزة
3. تتبع محاولات رفع الامتيازات بعد كشف معلومات النواة
4. مراقبة مؤشرات استغلال CVE-2021-25337 و CVE-2021-25370
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
5.1.1 - Information Security Policies and Procedures 5.2.1 - Access Control Implementation 5.3.1 - Cryptography and Data Protection 5.4.1 - Vulnerability Management 5.5.1 - Incident Response and Management
🔵 SAMA CSF
Governance (GV) - Security Policy and Risk Management Identify (ID) - Asset Management and Vulnerability Management Protect (PR) - Access Control and Data Protection Detect (DE) - Security Monitoring and Anomaly Detection Respond (RS) - Incident Response Procedures
🟡 ISO 27001:2022
A.5.1 - Policies for information security A.6.1 - Organization of information security A.8.1 - Asset management A.9.1 - Access control A.12.6 - Management of technical vulnerabilities A.14.2 - Information security requirements in supplier relationships
🟣 PCI DSS v4.0
Requirement 2 - Default security parameters Requirement 6.2 - Security patches and updates Requirement 7 - Restrict access to data Requirement 11.2 - Vulnerability scanning
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Samsung:Mobile Devices
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS0.16%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-11-29
Published 2022-11-08
Source Feed cisa_kev
Views 4
🇸🇦 Saudi Risk Score
8.7
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.