Description
Incorrect privilege assignment in Bluetooth in Maintenance mode prior to SMR Apr-2026 Release 1 allows physical attackers to bypass Extend Unlock.
Published: 2026-04-13
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Apply Patch
AI Analysis

Impact

The flaw involves an incorrect privilege assignment in the Bluetooth subsystem when a Samsung Mobile device is in Maintenance mode. An attacker who is physically near the device can exploit this to elevate privileges, bypassing the Extend Unlock security feature. The resulting privilege escalation could allow unauthorized modification of device settings or access to protected functionality.

Affected Systems

Affected devices are Samsung Mobile Devices running firmware versions prior to the SMR Apr‑2026 Release 1 update. Devices that have not applied the latest firmware and still operate in the earlier Maintenance mode remain vulnerable.

Risk and Exploitability

The CVSS score of 5.4 indicates a moderate severity vulnerability, and the lack of an EPSS score or KEV listing suggests lower likelihood of widespread exploitation. Based on the description, it is inferred that the attack vector requires physical proximity to the device’s Bluetooth interface. Remediation requires installing the SMR Apr‑2026 Release 1 firmware; until then, disabling Bluetooth or restricting Maintenance mode can reduce exposure. No public exploit is known.

Generated by OpenCVE AI on April 13, 2026 at 07:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply SMR Apr-2026 Release 1 firmware update to affected Samsung Mobile devices.
  • Verify that Bluetooth Maintenance mode no longer grants excessive privileges.
  • If unable to update immediately, disable Bluetooth or restrict Maintenance mode until patch is applied.

Generated by OpenCVE AI on April 13, 2026 at 07:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Samsung android
Weaknesses CWE-732
CPEs cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-apr-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-aug-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-dec-2024-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-dec-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-feb-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-feb-2026-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-jan-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-jan-2026-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-jul-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-jun-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-mar-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-mar-2026-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-may-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-nov-2024-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-nov-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-oct-2024-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-oct-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-sep-2024-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:14.0:smr-sep-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:-:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-apr-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-aug-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-dec-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-feb-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-feb-2026-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-jan-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-jan-2026-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-jul-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-jun-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-mar-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-mar-2026-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-may-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-nov-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-oct-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:15.0:smr-sep-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:16.0:-:*:*:*:*:*:*
cpe:2.3:o:samsung:android:16.0:smr-aug-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:16.0:smr-dec-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:16.0:smr-feb-2026-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:16.0:smr-jan-2026-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:16.0:smr-mar-2026-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:16.0:smr-nov-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:16.0:smr-oct-2025-r1:*:*:*:*:*:*
cpe:2.3:o:samsung:android:16.0:smr-sep-2025-r1:*:*:*:*:*:*
Vendors & Products Samsung android
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Title Bluetooth Maintenance Mode Privilege Escalation Allowing Extend Unlock Bypass
Weaknesses CWE-284

Mon, 13 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Samsung
Samsung mobile Devices
Samsung Mobile
Samsung Mobile samsung Mobile Devices
Vendors & Products Samsung
Samsung mobile Devices
Samsung Mobile
Samsung Mobile samsung Mobile Devices

Mon, 13 Apr 2026 06:15:00 +0000

Type Values Removed Values Added
Description Incorrect privilege assignment in Bluetooth in Maintenance mode prior to SMR Apr-2026 Release 1 allows physical attackers to bypass Extend Unlock.
References
Metrics cvssV4_0

{'score': 5.4, 'vector': 'CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Samsung Android Mobile Devices
Samsung Mobile Samsung Mobile Devices
cve-icon MITRE

Status: PUBLISHED

Assigner: SamsungMobile

Published:

Updated: 2026-04-13T13:09:06.730Z

Reserved: 2025-12-11T01:33:35.803Z

Link: CVE-2026-21011

cve-icon Vulnrichment

Updated: 2026-04-13T13:09:03.885Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-13T06:16:05.740

Modified: 2026-04-13T18:15:06.447

Link: CVE-2026-21011

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:52:57Z

Weaknesses