Advisory Details

March 11th, 2025

(0Day) (Pwn2Own) Samsung SmartThings Improper Verification of Cryptographic Signature Authentication Bypass Vulnerability

ZDI-25-127
ZDI-CAN-25615

CVE ID CVE-2025-2233
CVSS SCORE 8.8, AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Samsung
AFFECTED PRODUCTS SmartThings
VULNERABILITY DETAILS

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Samsung SmartThings. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the Hub Local API service, which listens on TCP port 8766 by default. The issue results from the lack of proper verification of a cryptographic signature. An attacker can leverage this vulnerability to bypass authentication on the system.

ADDITIONAL DETAILS

10/31/24 – ZDI reported the vulnerability to the vendor.

11/01/24 – The vendor acknowledged the report.

1/31/25 – The vendor states the case has been assessed as low priority.

02/14/25 – ZDI informed the vendor of the Pwn2Own Disclosure period, and that we will publish the case as a zero-day advisory should there not be a patch available.

-- Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the application


DISCLOSURE TIMELINE
  • 2024-10-31 - Vulnerability reported to vendor
  • 2025-03-11 - Coordinated public release of advisory
  • 2025-03-11 - Advisory Updated
CREDIT NiNi (@terrynini38514) from DEVCORE Research Team
BACK TO ADVISORIES