Skip to main content

CISA orders feds to patch Samsung zero-day used in spyware attacks

  • November 10, 2025
  • 1 reply
  • 16 views

Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54

November 10, 2025 By Sergiu Gatlan

 

CISA

CISA ordered U.S. federal agencies today to patch a critical Samsung vulnerability that has been exploited in zero-day attacks to deploy LandFall spyware on devices running WhatsApp.

Tracked as CVE-2025-21042, this out-of-bounds write security flaw was discovered in Samsung's libimagecodec.quram.so library, allowing remote attackers to gain code execution on devices running Android 13 and later.

While Samsung patched it in April following a report from Meta and WhatsApp Security Teams, Palo Alto Networks' Unit 42 revealed last week that attackers had been exploiting it since at least July 2024 to deploy previously unknown LandFall spyware via malicious DNG images sent over WhatsApp.

The spyware is capable of accessing the victim's browsing history, recording calls and audio, tracking their location, as well as accessing photos, contacts, SMS, call logs, and files.

According to Unit 42's analysis, it targets a wide range of Samsung flagship models, including the Galaxy S22, S23, and S24 series devices, as well as the Z Fold 4 and Z Flip 4.

 

>>Full Article<<

1 reply

TripleHelix
Moderator
Forum|alt.badge.img+63
  • Moderator
  • November 10, 2025

See here for more info: