Use of a broken or risky cryptographic algorithm in Smart Switch prior to version 3.7.67.2 allows local attackers to replace the restoring application. User interaction is required for triggering this vulnerability.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 28 Oct 2025 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Samsung
Samsung smart Switch
Weaknesses CWE-327
CPEs cpe:2.3:a:samsung:smart_switch:*:*:*:*:*:*:*:*
Vendors & Products Samsung
Samsung smart Switch

Fri, 10 Oct 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Oct 2025 06:45:00 +0000

Type Values Removed Values Added
Description Use of a broken or risky cryptographic algorithm in Smart Switch prior to version 3.7.67.2 allows local attackers to replace the restoring application. User interaction is required for triggering this vulnerability.
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SamsungMobile

Published:

Updated: 2025-10-22T03:55:23.676Z

Reserved: 2024-11-06T02:30:14.892Z

Link: CVE-2025-21062

cve-icon Vulnrichment

Updated: 2025-10-10T17:04:59.266Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-10T07:15:42.333

Modified: 2025-10-28T15:39:51.143

Link: CVE-2025-21062

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.