Cyber Posture

CVE-2026-20999

High

Published: 16 March 2026

Published
16 March 2026
Modified
31 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score 0.0012 30.2th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-20999 is a high-severity Authentication Bypass by Capture-replay (CWE-294) vulnerability in Samsung Smart Switch. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 30.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-294

Allows detection of capture-replay attacks by showing the replayed logon's timestamp as the last logon.

addresses: CWE-294

Protects against replay of captured session tokens or credentials by requiring authenticated, fresh session channels.

addresses: CWE-294

Wireless link protections commonly incorporate replay protection, reducing the exploitability of capture-replay weaknesses.

addresses: CWE-294

Accurate synchronized time enables tight timestamp windows that directly limit capture-replay windows in authentication protocols.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Authentication bypass via replay directly enables remote exploitation of the application for unauthorized privileged execution (T1190) and privilege escalation without credentials (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Authentication bypass by replay in Smart Switch prior to version 3.7.69.15 allows remote attackers to trigger privileged functions.

Deeper analysisAI

CVE-2026-20999 is an authentication bypass vulnerability caused by a replay attack in Samsung Smart Switch versions prior to 3.7.69.15. This flaw, associated with CWE-294, enables remote attackers to circumvent authentication mechanisms and execute privileged functions without valid credentials. The vulnerability received a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N), highlighting its high severity due to network accessibility, low attack complexity, and significant integrity impact.

Remote attackers can exploit this vulnerability over the network without requiring user interaction or prior privileges. By capturing and replaying authentication-related data, they can trigger privileged operations within Smart Switch, potentially leading to unauthorized control over device management functions, data transfers, or other high-privilege actions supported by the software.

The Samsung security advisory at https://security.samsungmobile.com/serviceWeb.smsb?year=2026&month=03 provides details on the issue, including recommendations to update to Smart Switch version 3.7.69.15 or later to mitigate the replay-based authentication bypass.

Details

CWE(s)

Affected Products

samsung
smart switch
≤ 3.7.69.15

CVEs Like This One

CVE-2026-20997Same product: Samsung Smart Switch
CVE-2026-20998Same product: Samsung Smart Switch
CVE-2026-25201Same vendor: Samsung
CVE-2025-20890Same vendor: Samsung
CVE-2026-20971Same vendor: Samsung
CVE-2025-20888Same vendor: Samsung
CVE-2025-54451Same vendor: Samsung
CVE-2025-26201Shared CWE-294
CVE-2025-54450Same vendor: Samsung
CVE-2025-27807Same vendor: Samsung

References