Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

IoT Security

Samsung MagicINFO Vulnerability Exploited Days After PoC Publication

Threat actors started exploiting a vulnerability in Samsung MagicINFO only days after a PoC exploit was published.

The exploitation of a high-severity vulnerability in the Samsung MagicINFO content management system (CMS) began within days after proof-of-concept (PoC) exploit code targeting it was made public, cybersecurity firm Arctic Wolf warns.

Tracked as CVE-2024-7399 (CVSS score of 8.8), the issue is described as an “improper limitation of a pathname to a restricted directory vulnerability in Samsung MagicINFO 9 Server” that could be exploited to write arbitrary files with system privileges.

Because the CMS does not properly sanitize a filename input, failing to validate the file extension and whether the user is authenticated, an unauthenticated attacker could upload JSP files and execute arbitrary server-side code with system privileges.

“The vulnerability allows for arbitrary file writing by unauthenticated users, and may ultimately lead to remote code execution when the vulnerability is used to write specially crafted JavaServer Pages (JSP) files,” Arctic Wolf notes.

Samsung patched the security defect in MagicINFO 9 Server version 21.1050, which was released in August 2024.

While the company has made no mention of the flaw’s exploitation, Arctic Wolf noticed it being targeted in the wild after a technical writeup and PoC code were published on April 30, 2025.

“Given the low barrier to exploitation and the availability of a public PoC, threat actors are likely to continue targeting this vulnerability,” the cybersecurity firm notes.

Organizations and end-users are advised to update to MagicINFO 9 Server version 21.1050 or newer as soon as possible.

Advertisement. Scroll to continue reading.

An all-in-one solution for content, device, and data management, MagicINFO can be used to create and distribute content to an organization’s linked displays, as well as to remotely manage and secure the displays.

Related: Android Update Patches FreeType Vulnerability Exploited as Zero-Day

Related: Google Warns of Samsung Zero-Day Exploited in the Wild

Related: SonicWall Flags Two More Vulnerabilities as Exploited

Related: Commvault Shares IoCs After Zero-Day Attack Hits Azure Environment

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Cloud and cybersecurity MSP Ekco has appointed Ben Savage as UK CEO.

Shane Barney has been appointed CISO of password management and PAM solutions provider Keeper Security.

Edge Delta has appointed Joan Pepin as its Chief Information Security Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.