CVE-2025-54441
Published: 23 July 2025
Summary
CVE-2025-54441 is a high-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Samsung Magicinfo 9 Server. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 37.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents unrestricted upload of dangerous file types by validating inputs at upload interfaces to block code injection.
Restricts the types of files that can be uploaded into the MagicINFO Server, prohibiting dangerous extensions that enable code injection.
Remediates the specific unrestricted file upload flaw by requiring timely patching to MagicINFO Server version 21.1080.0 or later.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unrestricted file upload (CWE-434) on public-facing server directly enables initial access via exploitation and web shell deployment for RCE.
NVD Description
Unrestricted Upload of File with Dangerous Type vulnerability in Samsung Electronics MagicINFO 9 Server allows Code Injection.This issue affects MagicINFO 9 Server: less than 21.1080.0.
Deeper analysisAI
CVE-2025-54441 is an Unrestricted Upload of File with Dangerous Type vulnerability (CWE-434) in Samsung Electronics MagicINFO 9 Server versions prior to 21.1080.0. This flaw allows attackers to upload files with dangerous extensions, enabling code injection. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact across confidentiality, integrity, and availability.
An attacker with low-privilege authenticated access (PR:L) can exploit this over the network (AV:N) with low complexity and no user interaction required. Successful exploitation enables code injection, potentially leading to remote code execution with high-impact consequences on the affected server.
Samsung's security advisory provides details on mitigation and patches, available at https://security.samsungtv.com/securityUpdates.
Details
- CWE(s)