Impact
Improper input validation in the handling of network restriction data allows a physical attacker to reference or alter carrier restriction settings, thereby bypassing the device’s carrier lock. The flaw enables the device to be unlocked from its carrier lock with no additional privileges. The vulnerability’s impact is limited to device unlocking and the resulting potential exposure of stored data, as it does not provide remote code execution or broader system compromise.
Affected Systems
Samsung Android devices running Android 13.0 through 16.0 that have not yet received the SMR Jan‑2026 Release 1 security patch. This includes all devices listed in the supplied CPE strings, covering SMR releases from December 2021 to September 2025 for Android 13‑16.
Risk and Exploitability
The CVSS score of 5.2 reflects a medium severity assessment, while the EPSS score of less than 1% indicates that the likelihood of exploitation in the near term is low. The vulnerability is not listed in CISA’s KEV catalog and no public exploit is known. Because the exploitation requires physical access to manipulate proprietary network restriction data or use a low‑level debugger, the attack surface is limited and the probability of targeted exploitation remains small.
OpenCVE Enrichment