Use of a broken or risky cryptographic algorithm in Smart Switch prior to version 3.7.67.2 allows local attackers to replace the restoring application. User interaction is required for triggering this vulnerability.
Metrics
Affected Vendors & Products
References
History
Tue, 28 Oct 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Samsung
Samsung smart Switch |
|
| Weaknesses | CWE-327 | |
| CPEs | cpe:2.3:a:samsung:smart_switch:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Samsung
Samsung smart Switch |
Fri, 10 Oct 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Oct 2025 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Use of a broken or risky cryptographic algorithm in Smart Switch prior to version 3.7.67.2 allows local attackers to replace the restoring application. User interaction is required for triggering this vulnerability. | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: SamsungMobile
Published: 2025-10-10T06:33:20.889Z
Updated: 2025-10-22T03:55:23.676Z
Reserved: 2024-11-06T02:30:14.892Z
Link: CVE-2025-21062
Updated: 2025-10-10T17:04:59.266Z
Status : Analyzed
Published: 2025-10-10T07:15:42.333
Modified: 2025-10-28T15:39:51.143
Link: CVE-2025-21062
No data.