U.S. CISA adds Samsung mobile devices flaw to its Known Exploited Vulnerabilities catalog
好的,我现在需要帮用户总结这篇文章的内容,控制在100个字以内。首先,我得快速浏览文章,抓住主要信息。 文章讲的是美国CISA将三星手机的一个漏洞加入已知被利用的漏洞目录。这个漏洞是CVE-2025-21042,CVSS评分8.8。这个漏洞被用来部署LANDFALL间谍软件,在中东的定向攻击中被利用。三星在4月修复了这个漏洞,但研究人员发现它在几个月前就被利用了。间谍软件通过WhatsApp发送的DNG图片传播,可以在零点击的情况下安装,窃取数据和监控位置。 接下来,我需要把这些关键点浓缩到100字以内。要包括CISA的动作、漏洞编号、影响、攻击方式和后果。同时,语言要简洁明了,不需要复杂的结构。 可能会这样组织:CISA将三星手机漏洞加入目录,该漏洞被用于部署间谍软件,通过WhatsApp传播图片文件,在用户不知情下安装,窃取数据和监控位置。 检查一下字数是否符合要求,并确保没有遗漏重要信息。 </think> 美国网络安全与基础设施安全局(CISA)将三星手机漏洞CVE-2025-21042加入已知被利用的漏洞目录。该漏洞被用于部署LANDFALL间谍软件,在中东地区的定向攻击中通过WhatsApp发送的DNG图片文件传播,在零点击情况下安装并窃取数据、监控位置。 2025-11-11 08:59:43 Author: securityaffairs.com(查看原文) 阅读量:6 收藏

U.S. CISA adds Samsung mobile devices flaw to its Known Exploited Vulnerabilities catalog

Pierluigi Paganini November 11, 2025

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Samsung mobile devices flaw to its Known Exploited Vulnerabilities catalog.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Samsung mobile devices flaw, tracked as CVE-2025-21042  (CVSS score of 8.8), to its Known Exploited Vulnerabilities (KEV) catalog.

The now-patched Samsung Galaxy flaw CVE-2025-21042 was exploited as a zero-day to deploy LANDFALL spyware in targeted attacks in the Middle East.

“Unit 42 researchers have uncovered a previously unknown Android spyware family, which we have named LANDFALL. To deliver the spyware, attackers exploited a zero-day vulnerability (CVE-2025-21042) in Samsung’s Android image processing library.” reads the report published by Palo Alto Networks Unit 42. “The specific flaw LANDFALL exploited, CVE-2025-21042, is not an isolated case but rather part of a broader pattern of similar issues found on multiple mobile platforms.”

The researchers confirmed that the vulnerability was actively exploited in the wild months before before Samsung patched it in April 2025.

The LANDFALL campaign, tracked as CL-UNK-1054, hid malware in DNG image files sent via WhatsApp. LANDFALL is Android spyware targeting Samsung Galaxy devices in the Middle East.

The malware enabled zero-click surveillance recording audio, tracking location, and stealing data. The campaign, active for months, shared tactics and infrastructure with Middle Eastern commercial spyware operations, suggesting links to private-sector offensive actors (aka PSOAs).

Samsung disclosed in Sept 2025 that a separate image-library flaw, tracked as CVE-2025-21043, had been exploited in the wild, but researchers found no evidence that LANDFALL used that bug. LANDFALL campaigns delivered malicious DNG images, often via WhatsApp, and researchers traced samples back to at least July 23, 2024 (file names like IMG-20240723-WA0000.jpg). The spyware exploited a Samsung zero-day (CVE-2025-21042) in a likely zero-click chain to install itself without user interaction. Once active,

The researchers uncovered the campaign while investigating malformed DNG image files.

“The malformed DNG image files we discovered have an embedded ZIP archive appended to the end of the file. Figure 1 shows one of these samples in a hex editor, indicating where the ZIP archive content begins near the end of the file.” continues the report. “Our analysis indicates these DNG files exploit CVE-2025-21042, a vulnerability in Samsung’s image-processing library libimagecodec.quram.so that Samsung patched in April 2025. The exploit extracts shared object library (.so) files from the embedded ZIP archive to run LANDFALL spyware. Figure 2 below shows a flowchart for this spyware.”

Samsung Galaxy flaw Landfall spyware

The payload drops two components: b.so, the main backdoor (“Bridge Head”), and l.so, a SELinux policy manipulator granting root privileges and persistence.

Once deployed, LANDFALL can record calls and audio, exfiltrate photos, messages, files, and system data, and monitor WhatsApp activity. It employs advanced evasion techniques like debugger and framework detection, SELinux modification, and certificate pinning for secure C2 over HTTPS.

The spyware targets flagship models (Galaxy S22–S24, Fold4, Flip4) and communicates with six known C2 servers across Europe. The researchers link it to a broader wave of DNG-based zero-click exploits affecting both Android and iOS platforms, underscoring the growing threat of image-processing vulnerabilities in mobile espionage.

The analysis of VirusTotal submission data revealed that potential targets of the campaign are in Iraq, Iran, Turkey, and Morocco.

The researchers are not able to attribute the campaign to a specific threat actor, however, Unit 42 researchers found its C2 infrastructure and domain patterns similar to those of Stealth Falcon (aka FruityArmor), though no direct links have been confirmed as of October 2025.

According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities, FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks against attacks exploiting the flaws in the catalog.

Experts also recommend that private organizations review the Catalog and address the vulnerabilities in their infrastructure.

CISA orders federal agencies to fix the vulnerabilities by December 1st, 2025.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, CISA)




文章来源: https://securityaffairs.com/184452/hacking/u-s-cisa-adds-samsung-mobile-devices-flaw-to-its-known-exploited-vulnerabilities-catalog.html
如有侵权请联系:admin#unsafe.sh