First published: Tue Mar 11 2025(Updated: )
Samsung SmartThings Improper Verification of Cryptographic Signature Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Samsung SmartThings. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Hub Local API service, which listens on TCP port 8766 by default. The issue results from the lack of proper verification of a cryptographic signature. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-25615.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
SmartThings | ||
SmartThings |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2233 is classified as a high severity vulnerability due to its potential for enabling unauthorized access.
CVE-2025-2233 affects installations of Samsung SmartThings where improper verification of cryptographic signatures occurs.
To fix CVE-2025-2233, ensure that you apply the latest security patches and updates provided by Samsung for SmartThings.
Yes, CVE-2025-2233 can be exploited by network-adjacent attackers without requiring authentication.
Exploiting CVE-2025-2233 allows attackers to bypass authentication, potentially leading to unauthorized access to sensitive functionalities.