Description

Samsung has released a critical patch to address a severe vulnerability in MagicINFO 9 Server, tracked as CVE-2025-4632, with a CVSS score of 9.8. This vulnerability is classified as a path traversal flaw that allows attackers to write arbitrary files on the system with elevated (system) privileges. It was discovered to be a patch bypass for a previously addressed issue, CVE-2024-7399, which was fixed in August 2024. Despite earlier patches, attackers managed to exploit the new variant, highlighting the severity and persistence of the vulnerability in the affected product. Exploitation of CVE-2025-4632 began shortly after a proof-of-concept (PoC) was publicly released by SSD Disclosure on April 30, 2025. According to cybersecurity firm Huntress, the flaw was actively used in the wild to deliver malware, including the notorious Mirai botnet. Their analysis revealed coordinated attacks in at least three incidents, where threat actors deployed payloads like srvany.exe and services.exe, and executed reconnaissance commands, suggesting preparation for a broader compromise or lateral movement. Samsung has confirmed that the latest release, MagicINFO 9 version 21.1052.0, mitigates this vulnerability. However, upgrading isn't straightforward for all users; migrating from version 8 to the patched 9.21.1052.0 requires an intermediate upgrade to 21.1050.0. Organizations using affected versions are strongly urged to apply the update immediately to reduce risk, as systems running older versions remain vulnerable. The attacks and subsequent fix underscore the critical importance of timely patching and vigilance in monitoring active exploit trends.