May 30 Advisory: Samsung MagicInfo9 Path Traversal Vulnerability Added to CISA KEV [CVE-2025-4632]

Rapid Response

Vulnerability Description

CVE-2025-4632 is a critical vulnerability in Samsung MagicInfo 9 Server (a digital signage software solution) affecting versions prior to 21.1052 with a CVSS score of 9.8. The issue arises from improper restriction of pathnames to designated directories, allowing attackers to write arbitrary files with system-level privileges.

Screenshot-2025-05-30-at-12.32.30-PM.png
Example Exposed MagicInfo Login Interface

Threat Activity

This vulnerability is actively being exploited and was added to the CISA Known Exploited Vulnerabilities (KEV) catalog on May 22, 2025.

Following the release of a technical proof-of-concept (PoC) by SSD Disclosure, Arctic Wolf reported suspicious activity targeting Samsung MagicInfo servers. While attribution is unconfirmed, the activity is suspected to be linked to CVE-2025-4632.

Initially, the PoC was believed to demonstrate exploitation of a related vulnerability, CVE-2024-7399, in the same product. However, testing showed that it remained effective even on systems patched against CVE-2024-7399. This indicates that CVE-2025-4632 bypasses the fix previously applied for CVE-2024-7399.

FieldDetails
CVE-IDCVE-2025-4362 – CVSS 9.8 (Critical) – assigned by Samsung TV & Appliance
Vulnerability DescriptionImproper pathname restriction, allowing arbitrary file writes with system-level privileges
Date of DisclosureMay 13, 2025
Date Reported as Actively ExploitedMay 22, 2025 (CISA KEV listing)
Affected Assets/MagicInfo/servlet/SWUpdateFileUploader implemented by com.samsung.magicinfo.protocol.file.SWUpdateFileUploadServlet
Vulnerable Software Versions Samsung MagicInfo V9 Server versions prior to 21.1052
PoC Available?A PoC exploit is publicly available here.
Exploitation StatusArctic Wolf observed suspicious activity potentially linked to this exploit and CISA has confirmed active exploitation.
Patch StatusFixed in Samsung MagicInfo Server V9 version 21.1052.0. Available for download on Samsung’s official website

Censys Perspective

At the time of writing, Censys observed 1,101 exposed Samsung MagicInfo servers online. Note that not all instances observed are vulnerable as we do not always have specific versions available. 

We identified a number of exposed Samsung MagicInfo servers referencing the file path src=”/MagicInfo/config[.]js”. When accessed, this resource reveals server metadata, including the installed MagicInfo version.

Screenshot-2025-05-30-at-2.36.55-PM.png

Using this method, we enumerated version data for 116 of the exposed hosts. See the table below for a breakdown of the versions we observed:

VersionVulnerability StatusHost Count
21.1052.0Not Vulnerable57
21.1050.0Vulnerable23
21.1020.0Vulnerable15
21.1040.3Vulnerable8
21.1040.2Vulnerable7
21.1010.4Vulnerable2
21.1051.0Vulnerable2
21.1010.2Vulnerable1
21.1060.0Not Vulnerable1

The queries below can be used to identify exposed instances of Samsung MagicInfo, but they are not necessarily vulnerable to the exploit. 

Censys Platform Query:

host.services.software: (vendor: "Samsung" and product: "MagicInfo 9 Server") or web.software: (vendor: "Samsung" and product: "MagicInfo 9 Server")

Censys Legacy Search Query:

services.software: (vendor="Samsung" and product="MagicInfo 9 Server")

Censys ASM Query:

host.services.software: (vendor="Samsung" and product="MagicInfo 9 Server") or web_entity.instances.software: (vendor="Samsung" and product="MagicInfo 9 Server")

Please note that these fingerprints were recently deployed and results may take up to 24 hours to fully propagate. 

magicinfo.png
Map of Exposed Samsung MagicInfo Servers

References

Subscribe to our blog