Sunday, May 18, 2025
HomeCVE/vulnerabilitySamsung MagicINFO 9 Server Vulnerability Actively Exploited in the Wild

Samsung MagicINFO 9 Server Vulnerability Actively Exploited in the Wild

Published on

SIEM as a Service

Follow Us on Google News

A critical security vulnerability in the Samsung MagicINFO 9 Server has come under active exploit, security researchers from Arctic Wolf have warned.

The flaw, tracked as CVE-2024-7399, allows unauthenticated attackers to remotely execute code and compromise digital signage infrastructure in organizations around the world.

Details of the Vulnerability

The Samsung MagicINFO 9 Server is a popular content management system widely deployed to manage and control digital signage displays across retail, transportation, and corporate environments.

- Advertisement - Google News

The vulnerability, CVE-2024-7399, stems from inadequate input validation in the server’s file upload functionality. Specifically, the flaw arises due to poor sanitization of filename input and a lack of checks for file extension or user authentication.

This oversight allows any remotely located, unauthenticated attacker to upload malicious JavaServer Pages (JSP) files to the server. If exploited, the attacker can execute arbitrary code on the server with full system privileges.

The vulnerability was initially disclosed in August 2024 by Samsung, with no exploits reported at the time.

However, on April 30, 2025, researchers released detailed technical write-ups and a proof-of-concept (PoC) exploit. Almost immediately, Arctic Wolf’s threat intelligence teams observed real-world exploitation attempts.

ProductAffected VersionsFixed VersionAssociated CVE
Samsung MagicINFO 9 ServerPrior to 21.105021.1050 and laterCVE-2024-7399

Due to the severity of the flaw and the public availability of a functional PoC, organizations using Samsung MagicINFO 9 Server face significant risk.

Cybercriminals can leverage this vulnerability for data theft, ransomware deployment, or disruption of critical signage infrastructure.

  • Immediate Upgrade: Organizations should urgently upgrade to at least version 21.1050 (or later), which contains the patch for CVE-2024-7399.
  • Follow Patching Best Practices: Carefully follow internal patch management and testing procedures to minimize operational disruption.
  • Monitor for Malicious Activity: Security teams should remain vigilant for suspicious activity on MagicINFO servers and apply additional monitoring where feasible.
  • Review Server Exposure: Limit direct internet exposure of MagicINFO servers, and enforce strict access controls.

As exploitation of CVE-2024-7399 intensifies, Arctic Wolf is proactively monitoring for associated malicious activity and will alert customers as warranted.

Organizations running vulnerable versions of Samsung MagicINFO 9 Server are urged not to delay remediation steps.

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...