INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Multiple sectors CRITICAL 30m Global vulnerability Information Technology / Software Infrastructure CRITICAL 32m Global data_breach Healthcare CRITICAL 48m Global data_breach Mobile Technology / Consumer Electronics HIGH 1h Global ransomware Cybersecurity Services / Multiple Sectors CRITICAL 1h Global apt Cryptocurrency and Blockchain CRITICAL 1h Global malware Financial Services, Mobile Payments HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 5h Global apt Cryptocurrency and Blockchain CRITICAL 13h Global malware Financial Services / Cryptocurrency CRITICAL 13h Global vulnerability Multiple sectors CRITICAL 30m Global vulnerability Information Technology / Software Infrastructure CRITICAL 32m Global data_breach Healthcare CRITICAL 48m Global data_breach Mobile Technology / Consumer Electronics HIGH 1h Global ransomware Cybersecurity Services / Multiple Sectors CRITICAL 1h Global apt Cryptocurrency and Blockchain CRITICAL 1h Global malware Financial Services, Mobile Payments HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 5h Global apt Cryptocurrency and Blockchain CRITICAL 13h Global malware Financial Services / Cryptocurrency CRITICAL 13h Global vulnerability Multiple sectors CRITICAL 30m Global vulnerability Information Technology / Software Infrastructure CRITICAL 32m Global data_breach Healthcare CRITICAL 48m Global data_breach Mobile Technology / Consumer Electronics HIGH 1h Global ransomware Cybersecurity Services / Multiple Sectors CRITICAL 1h Global apt Cryptocurrency and Blockchain CRITICAL 1h Global malware Financial Services, Mobile Payments HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 5h Global apt Cryptocurrency and Blockchain CRITICAL 13h Global malware Financial Services / Cryptocurrency CRITICAL 13h
Vulnerabilities

CVE-2021-25395

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Samsung Mobile Devices Race Condition Vulnerability — Samsung mobile devices contain a race condition vulnerability within the MFC charger driver that leads to a use-after-free allowing for a write gi
Published: Jun 29, 2023  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Samsung Mobile Devices Race Condition Vulnerability — Samsung mobile devices contain a race condition vulnerability within the MFC charger driver that leads to a use-after-free allowing for a write given a radio privilege is compromised.

🤖 AI Executive Summary

A critical race condition vulnerability in Samsung mobile device MFC charger drivers enables use-after-free exploitation, allowing arbitrary memory writes when radio privileges are compromised. With CVSS 9.0 severity and publicly available exploits, this poses significant risk to Samsung device users across Saudi Arabia, particularly in government and enterprise environments. Immediate patching is essential to prevent privilege escalation and system compromise.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 20, 2026 06:37
🇸🇦 Saudi Arabia Impact Assessment
High impact on Saudi government entities, military, and critical infrastructure personnel using Samsung devices. Banking sector (SAMA-regulated institutions) faces risk if employees use Samsung devices for business communications. Telecom operators (STC, Mobily, Zain) are affected as device manufacturers and service providers. Healthcare sector (MOH facilities) vulnerable if staff use Samsung devices for patient data access. Energy sector (ARAMCO, SEC) at risk for industrial espionage if engineering staff use compromised devices. Enterprise environments across all sectors using Samsung devices for BYOD programs are exposed.
🏢 Affected Saudi Sectors
Government and Defense Banking and Financial Services Telecommunications Healthcare Energy and Utilities Critical Infrastructure Enterprise/BYOD Programs
⚖️ Saudi Risk Score (AI)
8.7
/ 10.0
🔧 Remediation Steps (English)
Immediate Actions:
1. Identify all Samsung devices in your organization and inventory their current firmware versions
2. Disable radio functionality on non-critical Samsung devices until patching is complete
3. Restrict radio privilege access through SELinux policies and device administration controls
4. Monitor for suspicious MFC charger driver activity and memory access patterns

Patching Guidance:
1. Check Samsung Security Updates page for your device model and apply latest firmware patches immediately
2. Prioritize patching for devices used by government, finance, and critical infrastructure personnel
3. Test patches in controlled environment before enterprise rollout
4. Implement mandatory firmware update policies for all Samsung devices

Compensating Controls:
1. Implement Mobile Device Management (MDM) solutions to enforce security policies
2. Enable Knox security features and real-time kernel protection (RKP) if available
3. Restrict application permissions and disable unnecessary radio interfaces
4. Deploy network segmentation to isolate compromised devices
5. Enable audit logging for kernel memory access and driver operations

Detection Rules:
1. Monitor for unexpected MFC charger driver initialization sequences
2. Alert on memory access violations in charger driver memory regions
3. Track radio privilege escalation attempts and unauthorized radio interface access
4. Monitor for kernel panic or system crashes related to MFC driver
5. Implement HIDS rules to detect use-after-free exploitation patterns
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع أجهزة Samsung في المؤسسة وحصر إصدارات البرامج الثابتة الحالية
2. تعطيل وظائف الراديو على أجهزة Samsung غير الحرجة حتى اكتمال التصحيح
3. تقييد وصول امتيازات الراديو من خلال سياسات SELinux وعناصر تحكم إدارة الأجهزة
4. مراقبة نشاط برنامج تشغيل MFC المريب وأنماط الوصول إلى الذاكرة

إرشادات التصحيح:
1. تحقق من صفحة تحديثات أمان Samsung لطراز جهازك وطبق أحدث تصحيحات البرامج الثابتة فوراً
2. أولويات التصحيح للأجهزة المستخدمة من قبل موظفي الحكومة والمالية والبنية التحتية الحرجة
3. اختبر التصحيحات في بيئة محكومة قبل النشر على مستوى المؤسسة
4. تطبيق سياسات تحديث البرامج الثابتة الإلزامية لجميع أجهزة Samsung

الضوابط البديلة:
1. تطبيق حلول إدارة الأجهزة المحمولة (MDM) لفرض سياسات الأمان
2. تفعيل ميزات أمان Knox وحماية النواة في الوقت الفعلي (RKP) إن أمكن
3. تقييد أذونات التطبيق وتعطيل واجهات الراديو غير الضرورية
4. نشر تقسيم الشبكة لعزل الأجهزة المخترقة
5. تفعيل تسجيل التدقيق لوصول الذاكرة والعمليات الأساسية وعمليات برنامج التشغيل

قواعد الكشف:
1. مراقبة تسلسلات تهيئة برنامج تشغيل MFC غير المتوقعة
2. تنبيهات انتهاكات الوصول إلى الذاكرة في مناطق ذاكرة برنامج التشغيل
3. تتبع محاولات تصعيد امتيازات الراديو والوصول غير المصرح به إلى واجهات الراديو
4. مراقبة أعطال النواة أو تعطل النظام المتعلقة ببرنامج تشغيل MFC
5. تطبيق قواعد HIDS للكشف عن أنماط استغلال use-after-free
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
A.5.1.1 - Information security policies and procedures A.6.1.1 - Access control and privilege management A.8.1.1 - Asset management and inventory A.12.2.1 - Change management procedures A.12.6.1 - Management of technical vulnerabilities
🔵 SAMA CSF
ID.AM-2 - Software inventory and asset management PR.AC-1 - Access control and privilege management PR.PT-2 - Protective technology deployment DE.CM-8 - Vulnerability scanning and monitoring RS.MI-2 - Incident response and mitigation
🟡 ISO 27001:2022
A.5.1 - Management direction for information security A.6.1 - Internal organization A.8.1 - Asset management A.12.2 - Change management A.12.6 - Management of technical vulnerabilities and exposures
🟣 PCI DSS v4.0
Requirement 6.2 - Security patches and updates Requirement 11.2 - Vulnerability scanning Requirement 12.2 - Configuration standards
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Samsung:Mobile Devices
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS0.17%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2023-07-20
Published 2023-06-29
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
8.7
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.