HomeIntelligenceBrief
🛡️ VULNERABILITY BRIEF🟠 High🔍 ThreatIntel

Local Privilege Escalation in Samsung MagicINFO 9 Server (CVE‑2026‑25203) Enables SYSTEM‑Level Code Execution

Samsung MagicINFO 9 Server suffers a mis‑configured installer folder that lets a low‑privileged attacker gain SYSTEM rights. The flaw (CVE‑2026‑25203) scores 7.8 CVSS and is patched in version 21.1091.1. TPRM teams must verify patch status and reassess supply‑chain risk.

🛡️ LiveThreat™ Intelligence · 📅 April 16, 2026· 📰 zerodayinitiative.com
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
5 recommended
📰
Source
zerodayinitiative.com

Local Privilege Escalation in Samsung MagicINFO 9 Server (CVE‑2026‑25203) Enables SYSTEM‑Level Code Execution

What It Is – Samsung MagicINFO 9 Server contains an installer‑level flaw that grants a low‑privileged user write access to a critical folder. An attacker who can run code as a normal user can leverage the mis‑configured permissions to elevate to the Windows SYSTEM account and run arbitrary code.

Exploitability – The vulnerability is locally exploitable; no public exploit code has been released, but the required steps (low‑privilege code execution followed by folder abuse) are straightforward. CVSS 7.8 (High).

Affected Products – Samsung MagicINFO 9 Server (all versions prior to 21.1091.1).

TPRM Impact

  • Third‑party deployments of Samsung’s digital‑signage platform may become a foothold for attackers to pivot into corporate networks.
  • Compromise of the MagicINFO server can expose internal media assets, configuration files, and potentially allow lateral movement to other on‑premise systems.

Recommended Actions

  • Patch immediately to version 21.1091.1 or later.
  • Verify that the installation folder permissions are restricted to the service account only.
  • Conduct a privilege‑escalation audit on any remaining legacy MagicINFO instances.
  • Update third‑party risk registers to reflect the new vulnerability and re‑evaluate any contracts that rely on MagicINFO for critical communications.
  • Monitor endpoint logs for unexpected service‑account activity or execution of unsigned binaries in the MagicINFO directory.

Source: Zero Day Initiative Advisory – ZDI‑26‑268

📰 Original Source
http://www.zerodayinitiative.com/advisories/ZDI-26-268/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.