Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Israeli military fire hits South Lebanon base for the first time since ceasefire | Israel attacks Lebanon news

Samsung Patches CVE-2025-4632 Used for Mirai Botnet deployment via Magicinfo 9 Exploit

Bianlian and Ransomexx deploys SAP NetWeaver flaws and deploys Pipemagic Trojan

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Samsung Patches CVE-2025-4632 Used for Mirai Botnet deployment via Magicinfo 9 Exploit
Identity

Samsung Patches CVE-2025-4632 Used for Mirai Botnet deployment via Magicinfo 9 Exploit

userBy userMay 14, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 14, 2025Ravi LakshmananVulnerability/Malware

Samsung has released a software update to address critical security flaws in the wildly active MagicInfo 9 servers.

The vulnerability tracked as CVE-2025-4632 (CVSS score: 9.8) is described as a cross-path defect.

“Inappropriate restriction of pathnames for a restricted directory vulnerability in Samsung Magicinfo 9 server versions prior to 21.1052 allows an attacker to describe any file as system privileges,” according to the flawed advisory.

Cybersecurity

Note that CVE-2025-4632 is a patch bypass for CVE-2024-7399, another past traversal defect of the same product, patched by Samsung in August 2024.

CVE-2025-4632 was exploited in the wild shortly after the release of the SSD disclosure proof of concept (POC) for the deployment of Mirai Botnet on April 30, 2025.

Although initially assumed that the attack was targeting CVE-2024-7399, cybersecurity company Huntress first revealed the existence of less than the vulnerability last week after finding signs of exploitation even on Magicinfo 9 server instances running the latest version (21.1050).

In a follow-up report published on May 9, Huntress revealed three separate incidents, including the exploitation of CVE-2025-4632, with the unidentified actor downloading additional payloads such as “srvany.exe” and “services.exe” to the two hosts, and running the same command to run the reconnaissance command third.

Samsung Magicinfo 9 server users are advised to apply the latest fixes as soon as possible to prevent potential threats.

Cybersecurity

“We have confirmed that MagicInfo 9 21.1052.0 is mitigating the original issue raised on CVE-2025-4632,” Jamie Levy, director of enemy tactics for the Hanless, told Hacker News.

“We also discovered that machines with version v8 -v9 21.1050.0 are affected by this vulnerability. We also discovered that upgrading from MagicInfo V8 to V9 21.1052.0 is not easy as they must first upgrade to 21.1050.0 before applying the final patch.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBianlian and Ransomexx deploys SAP NetWeaver flaws and deploys Pipemagic Trojan
Next Article Israeli military fire hits South Lebanon base for the first time since ceasefire | Israel attacks Lebanon news
user
  • Website

Related Posts

Bianlian and Ransomexx deploys SAP NetWeaver flaws and deploys Pipemagic Trojan

May 14, 2025

Xinbi Telegram Market is $840 million in crypto crime, romance fraud, North Korean laundry

May 14, 2025

CTM360 Identifies a surge in phishing attacks targeting metabusiness users

May 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Israeli military fire hits South Lebanon base for the first time since ceasefire | Israel attacks Lebanon news

Samsung Patches CVE-2025-4632 Used for Mirai Botnet deployment via Magicinfo 9 Exploit

Bianlian and Ransomexx deploys SAP NetWeaver flaws and deploys Pipemagic Trojan

Trump’s Oil’s preferred price is $40-50 based on his social media post

Trending Posts

Israeli military fire hits South Lebanon base for the first time since ceasefire | Israel attacks Lebanon news

May 14, 2025

As combat resumes in Tripoli, Libya, we are seeking calmness | Conflict News

May 14, 2025

Did the US flutter first in the tariff war with China? |Trade War News

May 14, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

AI infrastructure startup TensorWave raises $100 million to meet the rising demand for AI calculations

DataBricks acquires serverless database startup neon for $1 billion to boost AI agent development

All the steps you can take to make your online bet safer

Etoro is revealed at a $52 IPO and is worth $4.2 billion amid the retail and crypto boom

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.