CVE-2025-54453
Published: 23 July 2025
Summary
CVE-2025-54453 is a high-severity Path Traversal (CWE-22) vulnerability in Samsung Magicinfo 9 Server. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 42.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses path traversal by requiring validation of pathname inputs to prevent access to restricted directories and subsequent code injection.
Mandates timely remediation of the specific flaw in MagicINFO 9 Server versions less than 21.1080.0 through patching or updates.
Enforces logical access controls to restrict file and directory access, mitigating unauthorized traversal even if input validation fails.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal (CWE-22) in public-facing MagicINFO server directly enables remote arbitrary code injection/RCE with network access.
NVD Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Samsung Electronics MagicINFO 9 Server allows Code Injection.This issue affects MagicINFO 9 Server: less than 21.1080.0.
Deeper analysisAI
CVE-2025-54453 is an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability, mapped to CWE-22, in Samsung Electronics MagicINFO 9 Server. This issue enables code injection and affects MagicINFO 9 Server versions less than 21.1080.0. Published on 2025-07-23, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), reflecting high severity due to its potential for significant impact.
An attacker with low privileges can exploit this vulnerability remotely over the network with low complexity and no user interaction required. Successful exploitation grants high-level access to confidentiality, integrity, and availability, allowing arbitrary code injection on the affected server.
Samsung's security advisory provides further details on mitigation; refer to https://security.samsungtv.com/securityUpdates.
Details
- CWE(s)