Samsung’s MagicINFO Security Flaw: Patch Now or Risk Joining the Botnet Brigade!
Samsung’s MagicINFO 9 Server recently had a “makeover” with a critical patch to fix CVE-2025-4632, a path traversal flaw. This flaw was actively exploited, even deploying the Mirai botnet. Users are urged to update to version 21.1052.0, but fair warning: upgrading is like a two-step dance—start with 21.1050.0 first!

Hot Take:
Samsung is playing a high-stakes game of Whac-A-Mole with cyber threats, as their MagicINFO 9 Server is being targeted more than a piñata at a kid’s birthday party. Who knew patching could be so reminiscent of a never-ending game of cat and mouse? Let’s hope this time they’ve caught Tom before he causes any more chaos!
Key Points:
– Samsung released a critical security update for the MagicINFO 9 Server to address a path traversal flaw.
– The vulnerability, known as CVE-2025-4632, is a patch bypass for a previously patched flaw, CVE-2024-7399.
– Cyber attackers have been exploiting this flaw in the wild, possibly to deploy the notorious Mirai botnet.
– The flaw was first identified by Huntress after users reported signs of exploitation even after updates.
– Users are advised to update to MagicINFO 9 version 21.1052.0 to mitigate the vulnerability.