Impact
The vulnerability involves an incorrect or missing check on the cryptographic signature used by Samsung Smart Switch. Because the application does not properly validate signature data, an attacker can supply a malicious payload that is mistakenly authenticated. This can lead to unauthorized account access or other privileged operations within the application. The weakness is classified as CWE‑347.
Affected Systems
Samsung Mobile Smart Switch versions before 3.7.69.15 are affected. The issue exists across all instances of Smart Switch running those releases on Android devices.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate impact, and the EPSS score of less than 1% shows a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Because the weakness allows remote attackers to bypass authentication, the attack vector is likely remote, possibly via the file transfer feature of Smart Switch. No exploit details or conditions are publicly documented, but if an attacker can deliver a crafted file or data stream to the application, the bypass can be executed.
OpenCVE Enrichment