三星MagicINFO 9服务器漏洞被实际利用
三星MagicINFO 9 Server存在高危漏洞CVE-2024-7399(CVSS 9.8),允许未认证攻击者上传恶意文件并控制系统。该漏洞源于身份验证缺失和文件处理不当。三星已修复于21.1050版本,但近期公开的POC导致活跃攻击增加,建议立即升级。 2025-5-6 12:30:15 Author: cybersecuritynews.com(查看原文) 阅读量:17 收藏

Samsung MagicINFO 9 Server Vulnerability

A critical security vulnerability in Samsung’s digital signage management platform has moved from theoretical risk to active threat as attackers begin exploiting it in real-world attacks. 

CVE-2024-7399, a high-severity vulnerability affecting Samsung MagicINFO 9 Server, is now being actively exploited by threat actors.

The vulnerability, which carries a CVSS score of 9.8 (indicating maximum severity), enables unauthenticated attackers to upload malicious files to vulnerable servers and potentially gain complete system control. 

Google News

Security experts warn that organizations using the affected software should implement patches immediately.

“Given the low barrier to exploitation and the availability of a public proof-of-concept, threat actors are likely to continue targeting this vulnerability,” noted Arctic Wolf in their security advisory. 

The exploitation activity began just days after technical details and a proof-of-concept exploit were published on April 30, 2025.

Critical Unauthenticated File Upload Vulnerability 

CVE-2024-7399 stems from a critical flaw in the input verification logic of Samsung MagicINFO 9 Server, a content management system widely used to manage and remotely control digital signage displays across various industries. 

The vulnerability specifically affects versions prior to 21.1050.

The security issue involves multiple weaknesses in the system’s design:

  • The /MagicInfo/servlet/SWUpdateFileUploader endpoint doesn’t verify if the user making the request is authenticated.
  • The system improperly sanitizes filename inputs and concatenates them to file paths without proper validation.
  • No verification of file extensions occurs during the upload process.

Technical analysis reveals the vulnerable code creates paths using:

This implementation allows attackers to write specially crafted JavaServer Pages (JSP) files to the server, which can then be executed to run arbitrary code with system-level privileges.

Samsung initially disclosed the vulnerability in August 2024, following responsible disclosure by security researchers. At that time, no exploitation was reported. 

However, the situation changed dramatically when a research article with technical details and a proof-of-concept exploit was published on April 30, 2025 and within days, Arctic Wolf began observing active exploitation attempts in the wild.

Risk FactorsDetails
Affected ProductsSamsung MagicINFO 9 Server (versions prior to 21.1050)
ImpactRemote code execution with SYSTEM privileges
Exploit PrerequisitesNo authentication required
CVSS 3.1 Score9.8 (Critical)

Mitigations

Arctic Wolf strongly recommends that organizations using Samsung MagicINFO 9 Server upgrade to the latest fixed version 21.1050 and later immediately.

Organizations should follow their established patching and testing guidelines to minimize potential operational disruptions while addressing this critical security issue.

Samsung addressed the vulnerability in version 21.1050, released in late 2024, by modifying the verification logic of user inputs to prevent path traversal attacks.

As threat actors continue to target internet-facing services, organizations should prioritize patching this vulnerability, especially since the exploit code is now publicly available and the barrier to exploitation is considered low.

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download


文章来源: https://cybersecuritynews.com/samsung-magicinfo-9-server-vulnerability/
如有侵权请联系:admin#unsafe.sh