Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

    What's Hot

    AI Agents Now Write Code in Parallel: OpenAI Introduces Codex, a Cloud-Based Coding Agent Inside ChatGPT

    May 16, 2025

    Linux Boot Process? Best Geeks Know It!

    May 16, 2025

    Microsoft’s Surface lineup reportedly losing another of its most interesting designs

    May 16, 2025
    Facebook X (Twitter) Instagram
    Facebook Mastodon Bluesky Reddit
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    • Home
    • News
    • Blog
    • Selfhosting
    • AI
    • Linux
    • Cyber Security
    • Gadgets
    • Gaming
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    Home»Cyber Security»Samsung MagicINFO 9 Web server RCE defect now manipulated in strikes
    Cyber Security

    Samsung MagicINFO 9 Web server RCE defect now manipulated in strikes

    MichaBy MichaMay 7, 2025No Comments3 Mins Read

    Samsung MagicINFO 9 Web server RCE defect now manipulated in strikes

    Cyberpunks are exploiting an unauthenticated remote code execution (RCE) susceptability in the Samsung MagicINFO 9 Server to hijack tools and deploy malware.

    Samsung MagicINFO Server is a centralized web content administration system (CMS) utilized to from another location manage and manage electronic signs screens made by Samsung. It is made use of by stores, airport terminals, hospitals, company buildings, and restaurants, where there’s a requirement to timetable, distribute, present, and screen multimedia material.

    The server component includes a file upload performance intended for upgrading display screen web content, but cyberpunks are abusing it to submit destructive code.

    The imperfection, tracked under CVE- 2024 – 7399 , was initially openly disclosed in August 2024 when it was repaired as component of the launch of variation 21 1050

    The supplier described the susceptability as an “Incorrect constraint of a pathname to a restricted directory site vulnerability in Samsung MagicINFO 9 Web server [that] permits enemies to create arbitrary data as system authority.”

    On April 30, 2025, safety scientists at SSD-Disclosure published a in-depth review together with a proof-of-concept (PoC) make use of that accomplishes RCE on the web server without any verification making use of a JSP internet covering.

    The opponent posts a malicious.jsp documents via an unauthenticated message request, manipulating course traversal to put it in a web-accessible location.

    By going to the uploaded data with a cmd criterion, they can implement approximate OS commands and see the output in the browser.

    Arctic Wolf currently reports that the CVE- 2024 – 7399 problem is actively manipulated in strikes a few days after the PoC’s release, showing that threat actors embraced the revealed strike approach in actual operations.

    “Provided the low barrier to exploitation and the schedule of a public PoC, threat stars are most likely to proceed targeting this susceptability,” advised Arctic Wolf

    One more energetic exploitation confirmation originates from hazard analyst Johannes Ullrich , who reported seeing a Mirai botnet malware variant leveraging CVE- 2024 – 7399 to take over tools.

    Offered the active exploitation standing of the imperfection, it is advised that system administrators take instant activity to patch CVE- 2024 – 7399 by upgrading the Samsung MagicINFO Server to variation 21 1050 or later on.

    Red Report 2025

    Based on an evaluation of 14 M harmful activities, discover the leading 10 MITRE ATT&CK strategies behind 93 % of attacks and exactly how to prevent them.


    Resource link

    0 Like this
    defect MagicINFO manipulated RCE Samsung Server strikes Web
    Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
    Previous ArticleApache Parquet exploit tool detect servers vulnerable to critical flaw
    Next Article Finding Perplexity.aI: Crucial AI Toolkit Insights

    Related Posts

    Cyber Security

    Where To Look For The Next Cybersecurity Unicorn

    May 16, 2025
    Cyber Security

    US charges 12 more suspects linked to $230 million crypto theft

    May 16, 2025
    Cyber Security

    Top 10 Best Practices for Effective Data Protection

    May 16, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    AI Developers Look Beyond Chain-of-Thought Prompting

    May 9, 202515 Views

    6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

    April 21, 202512 Views

    Andy’s Tech

    April 19, 20259 Views
    Stay In Touch
    • Facebook
    • Mastodon
    • Bluesky
    • Reddit

    Subscribe to Updates

    Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

      About Us

      Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

      Most Popular

      AI Developers Look Beyond Chain-of-Thought Prompting

      May 9, 202515 Views

      6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

      April 21, 202512 Views

      Subscribe to Updates

        Facebook Mastodon Bluesky Reddit
        • About Us
        • Contact Us
        • Disclaimer
        • Privacy Policy
        • Terms and Conditions
        © 2025 ioupdate. All Right Reserved.

        Type above and press Enter to search. Press Esc to cancel.