ID

VAR-202503-0324


CVE

CVE-2025-2233


TITLE

Samsung's  SmartThings  Digital Signature Verification Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2025-011222

DESCRIPTION

Samsung SmartThings Improper Verification of Cryptographic Signature Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Samsung SmartThings. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Hub Local API service, which listens on TCP port 8766 by default. The issue results from the lack of proper verification of a cryptographic signature. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-25615. Samsung's SmartThings Exists in a digital signature verification vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 2.25

sources: NVD: CVE-2025-2233 // JVNDB: JVNDB-2025-011222 // ZDI: ZDI-25-127

AFFECTED PRODUCTS

vendor:samsungmodel:smartthingsscope:ltversion:0.55.5

Trust: 1.0

vendor:サムスンmodel:smartthingsscope:eqversion: -

Trust: 0.8

vendor:サムスンmodel:smartthingsscope:eqversion:0.55.5

Trust: 0.8

vendor:サムスンmodel:smartthingsscope: - version: -

Trust: 0.8

vendor:samsungmodel:smartthingsscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-25-127 // JVNDB: JVNDB-2025-011222 // NVD: CVE-2025-2233

CVSS

SEVERITY

CVSSV2

CVSSV3

zdi-disclosures@trendmicro.com: CVE-2025-2233
value: HIGH

Trust: 1.0

OTHER: JVNDB-2025-011222
value: HIGH

Trust: 0.8

ZDI: CVE-2025-2233
value: HIGH

Trust: 0.7

zdi-disclosures@trendmicro.com: CVE-2025-2233
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.0

OTHER: JVNDB-2025-011222
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2025-2233
baseSeverity: HIGH
baseScore: 8.8
vectorString: AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-25-127 // JVNDB: JVNDB-2025-011222 // NVD: CVE-2025-2233

PROBLEMTYPE DATA

problemtype:CWE-347

Trust: 1.0

problemtype:Improper verification of digital signatures (CWE-347) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-011222 // NVD: CVE-2025-2233

EXTERNAL IDS

db:NVDid:CVE-2025-2233

Trust: 3.3

db:ZDIid:ZDI-25-127

Trust: 2.5

db:JVNDBid:JVNDB-2025-011222

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-25615

Trust: 0.7

sources: ZDI: ZDI-25-127 // JVNDB: JVNDB-2025-011222 // NVD: CVE-2025-2233

REFERENCES

url:https://www.zerodayinitiative.com/advisories/zdi-25-127/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2025-2233

Trust: 0.8

sources: JVNDB: JVNDB-2025-011222 // NVD: CVE-2025-2233

CREDITS

NiNi (@terrynini38514) from DEVCORE Research Team

Trust: 0.7

sources: ZDI: ZDI-25-127

SOURCES

db:ZDIid:ZDI-25-127
db:JVNDBid:JVNDB-2025-011222
db:NVDid:CVE-2025-2233

LAST UPDATE DATE

2025-08-15T23:33:42.900000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-25-127date:2025-04-16T00:00:00
db:JVNDBid:JVNDB-2025-011222date:2025-08-12T08:47:00
db:NVDid:CVE-2025-2233date:2025-08-08T01:25:21.267

SOURCES RELEASE DATE

db:ZDIid:ZDI-25-127date:2025-03-11T00:00:00
db:JVNDBid:JVNDB-2025-011222date:2025-08-12T00:00:00
db:NVDid:CVE-2025-2233date:2025-03-11T23:15:38.610