CVE-2021-25370 (GCVE-0-2021-25370)
Vulnerability from cvelistv5 – Published: 2021-03-26 18:23 – Updated: 2026-01-14 14:24
VLAI?
CISA KEV
Summary
An incorrect implementation handling file descriptor in dpu driver prior to SMR Mar-2021 Release 1 results in memory corruption leading to kernel panic.
Severity ?
6.1 (Medium)
CWE
- CVE-703: Improper Check or Handling of Exceptional Conditions
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Samsung Mobile | Samsung Mobile Devices |
Affected:
Selected O(8.X), P(9.0), Q(10.0), R(11.0) , < SMR Mar-2021 Release 1
(custom)
|
CISA KEV
Known Exploited Vulnerability - GCVE BCP-07 Compliant
KEV entry ID: c6034944-1b62-43b6-a14f-2a3adf4ec320
Exploited: Yes
Timestamps
First Seen: 2022-11-08
Asserted: 2022-11-08
Scope
Notes: KEV entry: Samsung Mobile Devices Memory Corruption Vulnerability | Affected: Samsung / Mobile Devices | Description: Samsung mobile devices using Mali GPU contain an incorrect implementation handling file descriptor in dpu driver. This incorrect implementation results in memory corruption, leading to kernel panic. This vulnerability was chained with CVE-2021-25337 and CVE-2021-25369. | Required action: Apply updates per vendor instructions. | Due date: 2022-11-29 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://security.samsungmobile.com/securityUpdate.smsb; https://nvd.nist.gov/vuln/detail/CVE-2021-25370
Evidence
Type: Vendor Report
Signal: Successful Exploitation
Confidence: 80%
Source: cisa-kev
Details
| Cwes | CWE-416 |
|---|---|
| Feed | CISA Known Exploited Vulnerabilities Catalog |
| Product | Mobile Devices |
| Due Date | 2022-11-29 |
| Date Added | 2022-11-08 |
| Vendorproject | Samsung |
| Vulnerabilityname | Samsung Mobile Devices Memory Corruption Vulnerability |
| Knownransomwarecampaignuse | Unknown |
References
Created: 2026-02-02 13:25 UTC
| Updated: 2026-02-06 07:53 UTC
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T20:03:05.565Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.samsungmobile.com/securityUpdate.smsb"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://security.samsungmobile.com"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-25370",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-04T21:25:47.186998Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2022-11-08",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-25370"
},
"type": "kev"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-703",
"description": "CWE-703 Improper Check or Handling of Exceptional Conditions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-14T14:24:49.025Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-25370"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Samsung Mobile Devices",
"vendor": "Samsung Mobile",
"versions": [
{
"lessThan": "SMR Mar-2021 Release 1",
"status": "affected",
"version": "Selected O(8.X), P(9.0), Q(10.0), R(11.0) ",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An incorrect implementation handling file descriptor in dpu driver prior to SMR Mar-2021 Release 1 results in memory corruption leading to kernel panic."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CVE-703: Improper Check or Handling of Exceptional Conditions",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-03-26T18:23:25.000Z",
"orgId": "3af57064-a867-422c-b2ad-40307b65c458",
"shortName": "Samsung Mobile"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.samsungmobile.com/securityUpdate.smsb"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://security.samsungmobile.com"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "mobile.security@samsung.com",
"ID": "CVE-2021-25370",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Samsung Mobile Devices",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "Selected O(8.X), P(9.0), Q(10.0), R(11.0) ",
"version_value": "SMR Mar-2021 Release 1"
}
]
}
}
]
},
"vendor_name": "Samsung Mobile"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An incorrect implementation handling file descriptor in dpu driver prior to SMR Mar-2021 Release 1 results in memory corruption leading to kernel panic."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CVE-703: Improper Check or Handling of Exceptional Conditions"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://security.samsungmobile.com/securityUpdate.smsb",
"refsource": "CONFIRM",
"url": "https://security.samsungmobile.com/securityUpdate.smsb"
},
{
"name": "https://security.samsungmobile.com",
"refsource": "MISC",
"url": "https://security.samsungmobile.com"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "3af57064-a867-422c-b2ad-40307b65c458",
"assignerShortName": "Samsung Mobile",
"cveId": "CVE-2021-25370",
"datePublished": "2021-03-26T18:23:25.000Z",
"dateReserved": "2021-01-19T00:00:00.000Z",
"dateUpdated": "2026-01-14T14:24:49.025Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2021-25370",
"cwes": "[\"CWE-416\"]",
"dateAdded": "2022-11-08",
"dueDate": "2022-11-29",
"knownRansomwareCampaignUse": "Unknown",
"notes": "https://security.samsungmobile.com/securityUpdate.smsb; https://nvd.nist.gov/vuln/detail/CVE-2021-25370",
"product": "Mobile Devices",
"requiredAction": "Apply updates per vendor instructions.",
"shortDescription": "Samsung mobile devices using Mali GPU contain an incorrect implementation handling file descriptor in dpu driver. This incorrect implementation results in memory corruption, leading to kernel panic. This vulnerability was chained with CVE-2021-25337 and CVE-2021-25369.",
"vendorProject": "Samsung",
"vulnerabilityName": "Samsung Mobile Devices Memory Corruption Vulnerability"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-25370\",\"sourceIdentifier\":\"mobile.security@samsung.com\",\"published\":\"2021-03-26T19:15:12.147\",\"lastModified\":\"2026-01-14T18:40:57.570\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An incorrect implementation handling file descriptor in dpu driver prior to SMR Mar-2021 Release 1 results in memory corruption leading to kernel panic.\"},{\"lang\":\"es\",\"value\":\"Un descriptor de archivo con manejo de implementaci\u00f3n incorrecta en el controlador dpu versiones anteriores a SMR Mar-2021 Release 1, resulta en una corrupci\u00f3n de memoria que conlleva a un p\u00e1nico del kernel.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"mobile.security@samsung.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.2,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":4.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":4.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"cisaExploitAdd\":\"2022-11-08\",\"cisaActionDue\":\"2022-11-29\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"Samsung Mobile Devices Memory Corruption Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-703\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:8.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"96273BC2-D835-48C8-8EAF-0FD6EAA94F09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:8.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E4F5C8C-AF0C-47F4-A3B0-A6D924FB72BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-apr-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"858555E6-5D30-4BBF-A5CD-FD1882209ABB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-apr-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"18D4924F-44AB-4E63-8040-D0B96F147BC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-aug-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8150E4FA-8F29-4974-BDE8-ED192879DEFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-aug-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D021B217-C481-43D1-A3E6-375E40BD4FB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-dec-2018-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"72145BA5-C781-4E36-BB39-33DD92B2F801\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-dec-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2E3ED73-5CF8-451F-914B-123B2312110D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-dec-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6986831F-0AF0-4719-BA45-4485D44D6707\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-feb-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"08E7C018-1293-4E29-83EB-AF177CA6B179\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-feb-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AB1563D-A951-4A9C-B348-0684DA242B05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-feb-2021-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B9A3B41-AAC9-4E23-A265-959A9852B94C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-jan-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D52A71AE-3D39-4F29-806B-603FE098510A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-jan-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"10C1DF2B-8371-4259-9139-7260EACEE98D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-jan-2021-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B93A5F5F-BF53-44D3-9583-811CC284DF86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-jul-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"60E1950A-282D-4065-AAA5-9BBB7F8D2C5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-jul-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4996EB5E-1FAB-4799-AE46-8176D74C49D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-jun-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"28950DDB-004F-4E01-9BBD-F5A320556D53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-jun-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"48B55CF5-CF20-48F7-A806-1234436566E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-mar-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF3FE371-E773-4AF6-A8DC-0FD9EF615647\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-mar-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"45104240-9D60-47EA-8582-1F912FE7A1F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-may-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F7D7092-5423-4CD1-819D-B784106D1342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-may-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CA7EA43-3CD8-4529-9071-3FB14EE30F45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-nov-2018-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A9693C8-FE11-4E03-8D4A-0D6FE77627DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-nov-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4561F7F-6B1F-412D-A174-5F9709ACF806\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-nov-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A54F7006-979F-4DF5-A350-77DC3A68536E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-oct-2018-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9282540E-26C5-4140-9074-480DB7F5DE41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-oct-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB304E43-DCCB-42E1-8B44-0825C9C437FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-oct-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"59BF1A24-8AC5-482F-B872-38D625FC669F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-sep-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EC7719C-8C21-4203-9ED9-E4C048FA5CF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:9.0:smr-sep-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2427A8F0-035E-4DB5-8B91-EBD8E826F6DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-apr-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"49DA0B6E-5E55-4893-8225-299E20DA2DD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-aug-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF52B720-DC8C-4EF0-B20B-7FA8B192FAFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-dec-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A0B5D2C-7AED-4330-ADAD-60F78A6A08DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-dec-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C7B9407-D5E0-49EB-A05D-C5E02060AF36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-feb-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F10815EF-AA9D-4899-B4EF-ED7A96E46959\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-feb-2021-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"18C71F11-7599-4AE1-B455-C7A50D8D5F4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-jan-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"91EA248A-4D4D-4A50-AC33-7098E17B7892\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-jan-2021-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"878AAF2D-E54A-4145-A618-81341ED4B0C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-jul-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3A43712-94EF-4670-A2FD-4363CBE850DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-jun-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDCC210B-4083-494C-A233-FE2CA672004B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-mar-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FA38AA3-A747-424E-B07E-F7931FA353F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-may-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B48628C-6780-46B4-B717-8589658B0DCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-nov-2019-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFCFFC02-EFEF-4A4C-A9A3-8BF355E36601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-nov-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB4658B8-9120-48E1-8A92-3430CBC6DC9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-oct-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7685DB5C-C3C2-44E2-AB00-CEE65C68460B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:10.0:smr-sep-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"47335942-37FB-4A1D-837A-5D0B2883ED10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C26195A5-31BE-4116-8F31-9F25BE57AB52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"25B42CE0-67DE-4611-8D70-DEEC975E32BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC082E25-1B7D-473D-A066-1463E6321CD5\"}]}]}],\"references\":[{\"url\":\"https://security.samsungmobile.com\",\"source\":\"mobile.security@samsung.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.samsungmobile.com/securityUpdate.smsb\",\"source\":\"mobile.security@samsung.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.samsungmobile.com\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.samsungmobile.com/securityUpdate.smsb\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-25370\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"US Government Resource\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security.samsungmobile.com/securityUpdate.smsb\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://security.samsungmobile.com\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T20:03:05.565Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-25370\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-04T21:25:47.186998Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2022-11-08\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-25370\"}}}], \"references\": [{\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-25370\", \"tags\": [\"government-resource\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-703\", \"description\": \"CWE-703 Improper Check or Handling of Exceptional Conditions\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-04T21:26:08.181Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.1, \"attackVector\": \"PHYSICAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"Samsung Mobile\", \"product\": \"Samsung Mobile Devices\", \"versions\": [{\"status\": \"affected\", \"version\": \"Selected O(8.X), P(9.0), Q(10.0), R(11.0) \", \"lessThan\": \"SMR Mar-2021 Release 1\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://security.samsungmobile.com/securityUpdate.smsb\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://security.samsungmobile.com\", \"tags\": [\"x_refsource_MISC\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.0.9\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An incorrect implementation handling file descriptor in dpu driver prior to SMR Mar-2021 Release 1 results in memory corruption leading to kernel panic.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"CVE-703: Improper Check or Handling of Exceptional Conditions\"}]}], \"providerMetadata\": {\"orgId\": \"3af57064-a867-422c-b2ad-40307b65c458\", \"shortName\": \"Samsung Mobile\", \"dateUpdated\": \"2021-03-26T18:23:25.000Z\"}, \"x_legacyV4Record\": {\"impact\": {\"cvss\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.1, \"attackVector\": \"PHYSICAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}}, \"source\": {\"discovery\": \"UNKNOWN\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_name\": \"Selected O(8.X), P(9.0), Q(10.0), R(11.0) \", \"version_value\": \"SMR Mar-2021 Release 1\", \"version_affected\": \"\u003c\"}]}, \"product_name\": \"Samsung Mobile Devices\"}]}, \"vendor_name\": \"Samsung Mobile\"}]}}, \"data_type\": \"CVE\", \"generator\": {\"engine\": \"Vulnogram 0.0.9\"}, \"references\": {\"reference_data\": [{\"url\": \"https://security.samsungmobile.com/securityUpdate.smsb\", \"name\": \"https://security.samsungmobile.com/securityUpdate.smsb\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://security.samsungmobile.com\", \"name\": \"https://security.samsungmobile.com\", \"refsource\": \"MISC\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"An incorrect implementation handling file descriptor in dpu driver prior to SMR Mar-2021 Release 1 results in memory corruption leading to kernel panic.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CVE-703: Improper Check or Handling of Exceptional Conditions\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2021-25370\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"mobile.security@samsung.com\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2021-25370\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-14T14:24:49.025Z\", \"dateReserved\": \"2021-01-19T00:00:00.000Z\", \"assignerOrgId\": \"3af57064-a867-422c-b2ad-40307b65c458\", \"datePublished\": \"2021-03-26T18:23:25.000Z\", \"assignerShortName\": \"Samsung Mobile\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…