CVE-2021-25370 (GCVE-0-2021-25370)
Vulnerability from cvelistv5 – Published: 2021-03-26 18:23 – Updated: 2025-10-21 23:25
VLAI?
CISA
Summary
An incorrect implementation handling file descriptor in dpu driver prior to SMR Mar-2021 Release 1 results in memory corruption leading to kernel panic.
Severity ?
6.1 (Medium)
CWE
- CVE-703: Improper Check or Handling of Exceptional Conditions
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Samsung Mobile | Samsung Mobile Devices |
Affected:
Selected O(8.X), P(9.0), Q(10.0), R(11.0) , < SMR Mar-2021 Release 1
(custom)
|
CISA Known Exploited Vulnerability
Data from the CISA Known Exploited Vulnerabilities Catalog
Date added: 2022-11-08
Due date: 2022-11-29
Required action: Apply updates per vendor instructions.
Used in ransomware: Unknown
Notes: https://security.samsungmobile.com/securityUpdate.smsb; https://nvd.nist.gov/vuln/detail/CVE-2021-25370
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T20:03:05.565Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.samsungmobile.com/securityUpdate.smsb"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://security.samsungmobile.com"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-25370",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-04T21:25:47.186998Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2022-11-08",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-25370"
},
"type": "kev"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T23:25:51.240Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-25370"
}
],
"timeline": [
{
"lang": "en",
"time": "2022-11-08T00:00:00+00:00",
"value": "CVE-2021-25370 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Samsung Mobile Devices",
"vendor": "Samsung Mobile",
"versions": [
{
"lessThan": "SMR Mar-2021 Release 1",
"status": "affected",
"version": "Selected O(8.X), P(9.0), Q(10.0), R(11.0) ",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An incorrect implementation handling file descriptor in dpu driver prior to SMR Mar-2021 Release 1 results in memory corruption leading to kernel panic."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CVE-703: Improper Check or Handling of Exceptional Conditions",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-03-26T18:23:25.000Z",
"orgId": "3af57064-a867-422c-b2ad-40307b65c458",
"shortName": "Samsung Mobile"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.samsungmobile.com/securityUpdate.smsb"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://security.samsungmobile.com"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "mobile.security@samsung.com",
"ID": "CVE-2021-25370",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Samsung Mobile Devices",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "Selected O(8.X), P(9.0), Q(10.0), R(11.0) ",
"version_value": "SMR Mar-2021 Release 1"
}
]
}
}
]
},
"vendor_name": "Samsung Mobile"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An incorrect implementation handling file descriptor in dpu driver prior to SMR Mar-2021 Release 1 results in memory corruption leading to kernel panic."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CVE-703: Improper Check or Handling of Exceptional Conditions"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://security.samsungmobile.com/securityUpdate.smsb",
"refsource": "CONFIRM",
"url": "https://security.samsungmobile.com/securityUpdate.smsb"
},
{
"name": "https://security.samsungmobile.com",
"refsource": "MISC",
"url": "https://security.samsungmobile.com"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "3af57064-a867-422c-b2ad-40307b65c458",
"assignerShortName": "Samsung Mobile",
"cveId": "CVE-2021-25370",
"datePublished": "2021-03-26T18:23:25.000Z",
"dateReserved": "2021-01-19T00:00:00.000Z",
"dateUpdated": "2025-10-21T23:25:51.240Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2021-25370",
"cwes": "[\"CWE-416\"]",
"dateAdded": "2022-11-08",
"dueDate": "2022-11-29",
"knownRansomwareCampaignUse": "Unknown",
"notes": "https://security.samsungmobile.com/securityUpdate.smsb; https://nvd.nist.gov/vuln/detail/CVE-2021-25370",
"product": "Mobile Devices",
"requiredAction": "Apply updates per vendor instructions.",
"shortDescription": "Samsung mobile devices using Mali GPU contain an incorrect implementation handling file descriptor in dpu driver. This incorrect implementation results in memory corruption, leading to kernel panic. This vulnerability was chained with CVE-2021-25337 and CVE-2021-25369.",
"vendorProject": "Samsung",
"vulnerabilityName": "Samsung Mobile Devices Memory Corruption Vulnerability"
},
"fkie_nvd": {
"cisaActionDue": "2022-11-29",
"cisaExploitAdd": "2022-11-08",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Samsung Mobile Devices Memory Corruption Vulnerability",
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B578E383-0D77-4AC7-9C81-3F0B8C18E033\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DFAAD08-36DA-4C95-8200-C29FE5B6B854\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D558D965-FA70-4822-A770-419E73BA9ED3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"109DD7FD-3A48-4C3D-8E1A-4433B98E1E64\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An incorrect implementation handling file descriptor in dpu driver prior to SMR Mar-2021 Release 1 results in memory corruption leading to kernel panic.\"}, {\"lang\": \"es\", \"value\": \"Un descriptor de archivo con manejo de implementaci\\u00f3n incorrecta en el controlador dpu versiones anteriores a SMR Mar-2021 Release 1, resulta en una corrupci\\u00f3n de memoria que conlleva a un p\\u00e1nico del kernel.\"}]",
"id": "CVE-2021-25370",
"lastModified": "2024-11-21T05:54:51.423",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"mobile.security@samsung.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"PHYSICAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.2, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 4.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 4.9, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2021-03-26T19:15:12.147",
"references": "[{\"url\": \"https://security.samsungmobile.com\", \"source\": \"mobile.security@samsung.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://security.samsungmobile.com/securityUpdate.smsb\", \"source\": \"mobile.security@samsung.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://security.samsungmobile.com\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://security.samsungmobile.com/securityUpdate.smsb\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "mobile.security@samsung.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-416\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-25370\",\"sourceIdentifier\":\"mobile.security@samsung.com\",\"published\":\"2021-03-26T19:15:12.147\",\"lastModified\":\"2025-10-30T15:37:00.243\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An incorrect implementation handling file descriptor in dpu driver prior to SMR Mar-2021 Release 1 results in memory corruption leading to kernel panic.\"},{\"lang\":\"es\",\"value\":\"Un descriptor de archivo con manejo de implementaci\u00f3n incorrecta en el controlador dpu versiones anteriores a SMR Mar-2021 Release 1, resulta en una corrupci\u00f3n de memoria que conlleva a un p\u00e1nico del kernel.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"mobile.security@samsung.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.2,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":4.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":4.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"cisaExploitAdd\":\"2022-11-08\",\"cisaActionDue\":\"2022-11-29\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"Samsung Mobile Devices Memory Corruption Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:8.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"96273BC2-D835-48C8-8EAF-0FD6EAA94F09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:8.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E4F5C8C-AF0C-47F4-A3B0-A6D924FB72BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-apr-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"858555E6-5D30-4BBF-A5CD-FD1882209ABB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-apr-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"18D4924F-44AB-4E63-8040-D0B96F147BC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-aug-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8150E4FA-8F29-4974-BDE8-ED192879DEFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-aug-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D021B217-C481-43D1-A3E6-375E40BD4FB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-dec-2018-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"72145BA5-C781-4E36-BB39-33DD92B2F801\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-dec-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2E3ED73-5CF8-451F-914B-123B2312110D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-dec-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6986831F-0AF0-4719-BA45-4485D44D6707\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-feb-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"08E7C018-1293-4E29-83EB-AF177CA6B179\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-feb-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AB1563D-A951-4A9C-B348-0684DA242B05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-feb-2021-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B9A3B41-AAC9-4E23-A265-959A9852B94C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-jan-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D52A71AE-3D39-4F29-806B-603FE098510A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-jan-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"10C1DF2B-8371-4259-9139-7260EACEE98D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-jan-2021-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B93A5F5F-BF53-44D3-9583-811CC284DF86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-jul-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"60E1950A-282D-4065-AAA5-9BBB7F8D2C5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-jul-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4996EB5E-1FAB-4799-AE46-8176D74C49D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-jun-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"28950DDB-004F-4E01-9BBD-F5A320556D53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-jun-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"48B55CF5-CF20-48F7-A806-1234436566E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-mar-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF3FE371-E773-4AF6-A8DC-0FD9EF615647\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-mar-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"45104240-9D60-47EA-8582-1F912FE7A1F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-may-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F7D7092-5423-4CD1-819D-B784106D1342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-may-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CA7EA43-3CD8-4529-9071-3FB14EE30F45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-nov-2018-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A9693C8-FE11-4E03-8D4A-0D6FE77627DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-nov-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4561F7F-6B1F-412D-A174-5F9709ACF806\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-nov-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A54F7006-979F-4DF5-A350-77DC3A68536E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-oct-2018-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9282540E-26C5-4140-9074-480DB7F5DE41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-oct-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB304E43-DCCB-42E1-8B44-0825C9C437FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-oct-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"59BF1A24-8AC5-482F-B872-38D625FC669F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-sep-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EC7719C-8C21-4203-9ED9-E4C048FA5CF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-sep-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2427A8F0-035E-4DB5-8B91-EBD8E826F6DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-apr-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"49DA0B6E-5E55-4893-8225-299E20DA2DD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-aug-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF52B720-DC8C-4EF0-B20B-7FA8B192FAFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-dec-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A0B5D2C-7AED-4330-ADAD-60F78A6A08DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-dec-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C7B9407-D5E0-49EB-A05D-C5E02060AF36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-feb-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F10815EF-AA9D-4899-B4EF-ED7A96E46959\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-feb-2021-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"18C71F11-7599-4AE1-B455-C7A50D8D5F4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-jan-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"91EA248A-4D4D-4A50-AC33-7098E17B7892\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-jan-2021-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"878AAF2D-E54A-4145-A618-81341ED4B0C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-jul-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3A43712-94EF-4670-A2FD-4363CBE850DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-jun-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDCC210B-4083-494C-A233-FE2CA672004B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-mar-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FA38AA3-A747-424E-B07E-F7931FA353F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-may-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B48628C-6780-46B4-B717-8589658B0DCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-nov-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFCFFC02-EFEF-4A4C-A9A3-8BF355E36601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-nov-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB4658B8-9120-48E1-8A92-3430CBC6DC9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-oct-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7685DB5C-C3C2-44E2-AB00-CEE65C68460B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-sep-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"47335942-37FB-4A1D-837A-5D0B2883ED10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C26195A5-31BE-4116-8F31-9F25BE57AB52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"25B42CE0-67DE-4611-8D70-DEEC975E32BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC082E25-1B7D-473D-A066-1463E6321CD5\"}]}]}],\"references\":[{\"url\":\"https://security.samsungmobile.com\",\"source\":\"mobile.security@samsung.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.samsungmobile.com/securityUpdate.smsb\",\"source\":\"mobile.security@samsung.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.samsungmobile.com\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.samsungmobile.com/securityUpdate.smsb\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-25370\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"US Government Resource\"]}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"affected\": [{\"product\": \"Samsung Mobile Devices\", \"vendor\": \"Samsung Mobile\", \"versions\": [{\"lessThan\": \"SMR Mar-2021 Release 1\", \"status\": \"affected\", \"version\": \"Selected O(8.X), P(9.0), Q(10.0), R(11.0) \", \"versionType\": \"custom\"}]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"An incorrect implementation handling file descriptor in dpu driver prior to SMR Mar-2021 Release 1 results in memory corruption leading to kernel panic.\"}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"HIGH\", \"attackVector\": \"PHYSICAL\", \"availabilityImpact\": \"HIGH\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"scope\": \"UNCHANGED\", \"userInteraction\": \"NONE\", \"vectorString\": \"CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"version\": \"3.1\"}}], \"problemTypes\": [{\"descriptions\": [{\"description\": \"CVE-703: Improper Check or Handling of Exceptional Conditions\", \"lang\": \"en\", \"type\": \"text\"}]}], \"providerMetadata\": {\"dateUpdated\": \"2021-03-26T18:23:25.000Z\", \"orgId\": \"3af57064-a867-422c-b2ad-40307b65c458\", \"shortName\": \"Samsung Mobile\"}, \"references\": [{\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://security.samsungmobile.com/securityUpdate.smsb\"}, {\"tags\": [\"x_refsource_MISC\"], \"url\": \"https://security.samsungmobile.com\"}], \"source\": {\"discovery\": \"UNKNOWN\"}, \"x_generator\": {\"engine\": \"Vulnogram 0.0.9\"}, \"x_legacyV4Record\": {\"CVE_data_meta\": {\"ASSIGNER\": \"mobile.security@samsung.com\", \"ID\": \"CVE-2021-25370\", \"STATE\": \"PUBLIC\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"product_name\": \"Samsung Mobile Devices\", \"version\": {\"version_data\": [{\"version_affected\": \"\u003c\", \"version_name\": \"Selected O(8.X), P(9.0), Q(10.0), R(11.0) \", \"version_value\": \"SMR Mar-2021 Release 1\"}]}}]}, \"vendor_name\": \"Samsung Mobile\"}]}}, \"data_format\": \"MITRE\", \"data_type\": \"CVE\", \"data_version\": \"4.0\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"An incorrect implementation handling file descriptor in dpu driver prior to SMR Mar-2021 Release 1 results in memory corruption leading to kernel panic.\"}]}, \"generator\": {\"engine\": \"Vulnogram 0.0.9\"}, \"impact\": {\"cvss\": {\"attackComplexity\": \"HIGH\", \"attackVector\": \"PHYSICAL\", \"availabilityImpact\": \"HIGH\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"scope\": \"UNCHANGED\", \"userInteraction\": \"NONE\", \"vectorString\": \"CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"version\": \"3.1\"}}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CVE-703: Improper Check or Handling of Exceptional Conditions\"}]}]}, \"references\": {\"reference_data\": [{\"name\": \"https://security.samsungmobile.com/securityUpdate.smsb\", \"refsource\": \"CONFIRM\", \"url\": \"https://security.samsungmobile.com/securityUpdate.smsb\"}, {\"name\": \"https://security.samsungmobile.com\", \"refsource\": \"MISC\", \"url\": \"https://security.samsungmobile.com\"}]}, \"source\": {\"discovery\": \"UNKNOWN\"}}}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T20:03:05.565Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://security.samsungmobile.com/securityUpdate.smsb\"}, {\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"https://security.samsungmobile.com\"}]}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-25370\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-04T21:25:47.186998Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2022-11-08\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-25370\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-04T21:26:08.181Z\"}, \"timeline\": [{\"time\": \"2022-11-08T00:00:00+00:00\", \"lang\": \"en\", \"value\": \"CVE-2021-25370 added to CISA KEV\"}], \"title\": \"CISA ADP Vulnrichment\"}]}",
"cveMetadata": "{\"assignerOrgId\": \"3af57064-a867-422c-b2ad-40307b65c458\", \"assignerShortName\": \"Samsung Mobile\", \"cveId\": \"CVE-2021-25370\", \"datePublished\": \"2021-03-26T18:23:25.000Z\", \"dateReserved\": \"2021-01-19T00:00:00.000Z\", \"dateUpdated\": \"2025-10-21T19:46:50.031Z\", \"state\": \"PUBLISHED\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…