Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 28 Oct 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Samsung
Samsung smart Switch |
|
| Weaknesses | CWE-327 | |
| CPEs | cpe:2.3:a:samsung:smart_switch:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Samsung
Samsung smart Switch |
Fri, 10 Oct 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Oct 2025 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Use of a broken or risky cryptographic algorithm in Smart Switch prior to version 3.7.67.2 allows local attackers to replace the restoring application. User interaction is required for triggering this vulnerability. | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: SamsungMobile
Published:
Updated: 2025-10-22T03:55:23.676Z
Reserved: 2024-11-06T02:30:14.892Z
Link: CVE-2025-21062
Updated: 2025-10-10T17:04:59.266Z
Status : Analyzed
Published: 2025-10-10T07:15:42.333
Modified: 2025-10-28T15:39:51.143
Link: CVE-2025-21062
No data.
OpenCVE Enrichment
No data.