Impact
An improper handling of file paths in Samsung Mobile's Galaxy Store allows a local attacker to construct a path that escapes the intended directory boundary, enabling creation or modification of arbitrary files. The vulnerability is classified as improper path handling (CWE‑22) and could lead to file overwrite or insertion with the same privilege level as the Galaxy Store service, potentially allowing an attacker to install malicious payloads or manipulate app data.
Affected Systems
Samsung Mobile devices running the Galaxy Store application version earlier than 4.6.03.8 are affected. The issue applies to all Galaxy Store installations on Samsung mobile platforms that have not applied any patches beyond that version.
Risk and Exploitability
The CVSS base score of 5.9 indicates moderate severity, with an EPSS below 1% suggesting low probability of exploitation in the wild. The vulnerability does not appear in the CISA KEV catalog. Because the attack requires local access to the device and the ability to invoke Galaxy Store functions, the attack vector is likely local and does not permit remote exploitation. An attacker would need physical or root‑level control of the device to trigger the path traversal and write files with Galaxy Store privileges.
OpenCVE Enrichment