Samsung fixed actively exploited zero-day
Samsung修复了 CVE-2025-21043 远程代码执行漏洞,该漏洞被用于针对 Android 设备的零日攻击。该漏洞涉及 libimagecodec.quram.so 中的内存越界写入问题。Meta 和 WhatsApp 于 8 月 13 日报告该问题。Samsung 已发布补丁修复错误实现。WhatsApp 提醒部分用户可能受到间谍软件攻击,并建议更新设备以减少风险。该攻击无需用户交互,通常与资源丰富的威胁行为者相关。 2025-9-12 11:44:35 Author: securityaffairs.com(查看原文) 阅读量:25 收藏

Samsung fixed actively exploited zero-day

Pierluigi Paganini September 12, 2025

Samsung fixed the remote code execution flaw CVE-2025-21043 that was exploited in zero-day attacks against Android devices.

Samsung addressed the remote code execution vulnerability, tracked as CVE-2025-21043, that was exploited in zero-day attacks against Android users.

The vulnerability is an out-of-bounds Write in libimagecodec.quram.so prior to SMR Sep-2025 Release 1. A remote attacker can exploit the flaw to execute arbitrary code.

An out-of-bounds write occurs when a program writes data beyond the boundaries of its allocated memory buffer, which can corrupt data, crash the program, or allow code execution by attackers.

The vulnerability was reported by the security teams of Meta and WhatsApp on August 13.

Samsung released a patch to fix the incorrect implementation.

In late August, WhatsApp sent out a round of threat notifications to individuals they believe were targeted by an advanced spyware campaign in the past 90 days. WhatsApp warned some users that a malicious message may have exploited OS flaws to compromise devices and data.

The attack requires no user interaction, meaning victims could be compromised without clicking a link or downloading a file. Such exploits are typically linked to well-resourced threat actors, including state-sponsored groups. WhatsApp urges recipients of the notification to review their devices for unusual behavior, update to the latest version, and enable enhanced security measures to reduce the risk of further compromise.

WhatsApp announced that it had already patched the flaw exploited by attackers, but risks remain.

Amnesty researchers who are investigating the attack report that the exploit targets an authorization bypass issue, tracked as CVE-2025-55177, in WhatsApp on iOS and Mac. The exploit allowed attackers to force “content from arbitrary URL” to be rendered on a target device. Threat actors also exploited a zero-click vulnerability, recently patched by Apple (CVE-2025-43300), in the attacks.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Meta)




文章来源: https://securityaffairs.com/182135/hacking/samsung-fixed-actively-exploited-zero-day.html
如有侵权请联系:admin#unsafe.sh