Intelligence Briefing Data Privacy & Cybersecurity CISA and CSIRT-ITA Flag Samsung MagicINFO Explo...

Italian and U.S. authorities both disclosed active exploitation of Samsung MagicINFO 9 flaws within 48 hours.

Italian CSIRT and CISA both disclosed active exploitation of Samsung MagicINFO 9 vulnerabilities within 48 hours. The paired advisories suggest coordinated threat actor activity targeting enterprise digital signage infrastructure.

Samsung MagicINFO Critical CVE Actively Exploited
Active exploitation of Samsung MagicINFO 9 Server vulnerability CVE-2025-4632 (CVSS v3 9.8) has been detected by Italian CSIRT. The vulnerability, described as a Path Traversal type and potentially a patch bypass for CVE-2024-7399, allows arbitrary file write on target systems and has been used to distribute Mirai botnet in some cases. A proof of concept is publicly available. Affected versions are MagicINFO 9 Server prior to version 21.1052. The vendor has released a patch.

CISA Flags Samsung MagicINFO 9 Path Traversal Vulnerability
CISA added CVE-2024-7399, a path traversal vulnerability in Samsung MagicINFO 9 Server versions before 21.1050, to its Known Exploited Vulnerabilities catalog. The flaw carries a CVSS 3.1 score of 8.8 (HIGH) and allows authenticated attackers with network access to write arbitrary files as system authority, potentially enabling full system compromise. The vulnerability was reported by an anonymous researcher working with Trend Micro Zero Day Initiative and has been confirmed as actively exploited in the wild since at least May 2025. Organizations running Samsung MagicINFO 9 Server should verify their version and apply the version 21.1050 patch immediately.

Sources

CISA Flags Samsung MagicINFO 9 Path Traversal Vulnerability

Samsung MagicINFO Critical CVE Actively Exploited

More from Data Privacy & Cybersecurity Browse all →

Get the briefing in your inbox

The top regulatory stories, delivered daily. No noise.

Free. Unsubscribe anytime.