Samsung has released a critical security update to patch CVE-2025-4632, a high-severity vulnerability in its MagicINFO 9 Server platform actively exploited by attackers to deploy the Mirai botnet.

CVE-2025-4632: What You Need to Know

  • Vulnerability ID: CVE-2025-4632
  • CVSS Score: 9.8 (Critical)
  • Affected Product: Samsung MagicINFO 9 Server (versions before 21.1052.0)
  • Exploitation Type: Unauthenticated remote arbitrary file write
  • Patch Bypass Of: CVE-2024-7399

This vulnerability stems from improper validation of file paths, which allows attackers to carry out path traversal attacks. By crafting malicious file paths, threat actors can write arbitrary files to the server with system-level privileges, paving the way for full server compromise.

Active Exploitation in the Wild

The flaw was actively exploited in the wild, as per cybersecurity firm Huntress, who observed attackers using it to:

  • Drop malicious files like srvany.exe and services.exe
  • Run reconnaissance commands such as whoami and query user
  • Deploy the Mirai botnet, a notorious malware used for large-scale DDoS attacks

The exploit chain was triggered after a proof-of-concept (PoC) was publicly released by SSD Disclosure on April 30, 2025.

A Patch Bypass Resurfaces

CVE-2025-4632 is particularly dangerous because it acts as a patch bypass for CVE-2024-7399, previously believed to be mitigated. This allowed attackers to once again target vulnerable MagicINFO servers, emphasizing the importance of defense-in-depth and continuous patch validation.

Mitigation and Patch Guidance

Samsung has addressed the vulnerability in MagicINFO 9 Server version 21.1052.0. Users on older versions should follow this two-step upgrade path:

  1. Upgrade to version 21.1050.0
  2. Then proceed to 21.1052.0

Jamie Levy, Director of Adversary Tactics at Huntress, confirmed:

“We have verified that MagicINFO 9 21.1052.0 does mitigate the original issue raised in CVE-2025-4632.”

Recommendations

Organizations using MagicINFO should:

  • Immediately apply the latest patch
  • Audit systems for unauthorized changes or signs of compromise
  • Implement WAF, EDR, and network segmentation to mitigate future exposure

Final Thoughts

With the rapid release of PoC code and proven active exploitation, CVE-2025-4632 serves as a stark reminder of how quickly attackers can capitalize on software flaws. Samsung MagicINFO users must act now to secure their systems against future compromise and botnet recruitment.

Leave a Reply

Your email address will not be published. Required fields are marked *