Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit

Source: The Hacker News
Published: 2025-05-14 17:57
Fetched: 2025-05-14 18:17

Summary

Samsung has issued critical updates for its MagicINFO 9 Server to patch a severe vulnerability, CVE-2025-4632, which has been exploited to deploy the Mirai Botnet. This path traversal flaw, with a CVSS score of 9.8, allows attackers to access restricted directories, posing significant security risks. The vulnerability has been actively used in the wild, underscoring the importance of immediate patch application. Samsung's swift response highlights the necessity for organizations to prioritize security updates to protect against such high-impact threats. Users of MagicINFO 9 Server are urged to update to version 21.1052 or later to mitigate potential exploits.

LinkedIn Post

Samsung patches a critical flaw in MagicINFO 9 Server, CVE-2025-4632, exploited by the Mirai Botnet. This path traversal vulnerability highlights the urgency of applying security updates. Protect your systems now! #Cybersecurity #Samsung #MiraiBotnet #SecurityUpdates

Content

Samsung has released software updates to address a critical security flaw in MagicINFO 9 Server that has been actively exploited in the wild. The vulnerability, tracked as CVE-2025-4632 (CVSS score: 9.8), has been described as a path traversal flaw. "Improper limitation of a pathname to a restricted directory vulnerability in Samsung MagicINFO 9 Server version before 21.1052 allows attackers to