杏吧传媒

Search
searchclose icon

Rapid Response: Samsung MagicINFO 9 Server Flaw

Glitch effectGlitch effectGlitch effect
Glitch banner

TL;DR: While reports have indicated the latest version of Samsung MagicINFO 9 Server fixes a high-severity flaw (CVE-2024-7399), 杏吧传媒 has independently verified that the latest version (21.1050.0) is vulnerable to a publicly available proof-of-concept (PoC). We have also observed exploitation in the wild impacting the latest version. Users should ensure their MagicINFO 9 Server is not internet-facing until a fix is available.聽聽聽


Beginning on January 12, 2025, a researcher working with SSD Disclosure reportedly notified Samsung about a number of vulnerabilities present in MagicINFO 9 Server, its content management system used to control digital signage displays. These vulnerabilities together allow an unauthenticated user to upload a web shell and achieve remote code execution under the Apache Tomcat process.

This was reportedly marked as a duplicate issue by Samsung, and after more than 90 days from the time of reporting, this information was made available in the following advisory on April 30.

details the affected version as MagicINFO 9 Server 21.1050.0, which at the time of publishing was the latest version made available. Despite this, in August 2024, a vulnerability with a very similar description was registered as , and a 聽was made available at the time.

Within days of publishing the public disclosure by SSD Disclosure, Arctic Wolf in the wild and publicly reported this as being the result of CVE-2024-7399, stating systems affected were versions prior to 21.1050. This was quickly picked up by media outlets with the same narrative that systems running version 21.1050 were safe. 杏吧传媒 also observed exploitation in the wild; however, some of the systems impacted had the latest available patch, which strengthened the assumption that the latest available version (21.1050.0) was indeed still vulnerable, as mentioned by SSD Disclosure.聽

杏吧传媒 was able to that version 21.1050.0 and 21.1040.2 of MagicINFO 9 Server was indeed still vulnerable, and that there are currently no patches available. It can only be concluded that the patch from August 2024 was either incomplete or for a separate, but similar, vulnerability. 杏吧传媒 has reached out to the team at Samsung, notifying them of this, but at the time of writing, is yet to receive a response.

Figure 1: View of Config File with Version Number and Webshell



As seen in the video above, MagicINFO 9 Server version 21.1050 is vulnerable to the publicly reported PoC.

Johannes Ullrich also a version of the Mirai botnet, which is now exploiting this unpatched vulnerability in the wild.

At this point in time it鈥檚 important to ensure MagicINFO 9 Server is not internet-facing until a proper update has been released and patch applied.




Share

Sign Up for 杏吧传媒 Updates

Get insider access to 杏吧传媒 tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy
Oops! Something went wrong while submitting the form.
杏吧传媒 at work