CVE-2025-54443

Samsung · Samsung Electronics MagicINFO 9 Server

A critical vulnerability has been identified in Samsung Electronics MagicINFO 9 Server, designated as CVE-2025-54443.

Executive summary

A critical vulnerability has been identified in Samsung Electronics MagicINFO 9 Server, designated as CVE-2025-54443. This flaw allows an unauthenticated remote attacker to bypass security restrictions and upload a malicious file, known as a web shell, to the server. Successful exploitation would grant the attacker complete control over the affected server, enabling data theft, service disruption, and further attacks against the internal network.

Vulnerability

This vulnerability is an Improper Limitation of a Pathname to a Restricted Directory, commonly known as Path Traversal. The application fails to properly sanitize user-supplied input for file paths during an upload operation. An attacker can craft a malicious request containing "dot-dot-slash" (../) sequences in the filename or path parameter to navigate outside of the intended, restricted upload directory and write a file to an arbitrary location on the server's filesystem. By uploading a web shell (e.g., a .jsp or .aspx file) to a web-accessible directory, the attacker can then execute arbitrary commands on the server with the privileges of the web service account.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.8. Exploitation could lead to a full system compromise of the MagicINFO server. The business impact includes a high risk to data confidentiality, as the attacker could exfiltrate all content and data managed by the platform. System integrity is compromised, as the attacker can modify or delete data and plant malware. Availability is also at high risk, as the attacker could disrupt or completely disable the MagicINFO service. A compromised server can also be used as a staging point to pivot and launch further attacks against other systems within the corporate network.

Remediation

Immediate Action: The primary remediation is to apply the security patches provided by the vendor. Administrators must update the Samsung Electronics MagicINFO 9 Server to the latest available version that addresses this vulnerability. After patching, it is crucial to review web server access logs and filesystem for any indicators of compromise that may have occurred prior to the update.

Proactive Monitoring: Security teams should actively monitor web server access logs for suspicious file upload attempts containing path traversal sequences (e.g., ../, ..%2f, ..\\). Monitor file systems in web-accessible directories for the creation of unexpected files, especially those with executable extensions (e.g., .jsp, .php, .aspx, .sh). Network monitoring should be configured to detect and alert on any unusual outbound connections originating from the MagicINFO server, which could indicate a web shell communicating with a command-and-control server.

Compensating Controls: If immediate patching is not feasible, organizations should implement compensating controls. Deploy a Web Application Firewall (WAF) with strict rules to detect and block path traversal attempts in HTTP requests. Restrict network access to the MagicINFO server's management interface, allowing connections only from trusted IP addresses. Implementing File Integrity Monitoring (FIM) on the web server's directories can provide alerts on unauthorized file creation or modification.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the critical severity of CVE-2025-54443 and the high likelihood of future exploitation, we strongly recommend that organizations prioritize the immediate patching of all affected Samsung MagicINFO 9 servers. This vulnerability represents a direct path to server compromise and should be treated with the highest urgency. Although not currently listed on the CISA KEV, its characteristics make it a prime candidate for future inclusion. Organizations should apply the vendor-supplied updates and verify the absence of compromise as soon as possible.