Impact
The vulnerability in the Samsung Galaxy Store arises from an improper verification of cryptographic signatures for applications. Prior to version 4.6.03.8, the store fails to confirm the signature of packages before allowing installation. Consequently, a local attacker who can influence the store locally can install any application, potentially with malicious payloads. The weakness corresponds to CWE‑347 and can lead to arbitrary code execution or compromised device integrity and confidentiality.
Affected Systems
The affected product is Samsung Mobile’s Galaxy Store. Versions earlier than 4.6.03.8 are vulnerable. No other versions are listed as impacted.
Risk and Exploitability
The assessment scores a CVSS base of 5.9, indicating medium severity, and an EPSS of less than 1 %, showing a very low likelihood of being exploited in the wild. It is not included in the CISA KEV catalogue. The attack requires local access to the device and the ability to manipulate the Galaxy Store such that an alternative application package is presented and installed. Once installed, the malicious application operates with the permissions granted to it, potentially compromising the device.
OpenCVE Enrichment