{"id":439,"date":"2025-05-07T12:21:39","date_gmt":"2025-05-07T10:21:39","guid":{"rendered":"https:\/\/blog.digitalonion.ly\/?p=439"},"modified":"2025-05-07T12:33:38","modified_gmt":"2025-05-07T10:33:38","slug":"samsung-magicinfo-9-server-rce-flaw-now-exploited-in-attacks","status":"publish","type":"post","link":"https:\/\/blog.digitalonion.ly\/?p=439&lang=en","title":{"rendered":"Samsung MagicINFO 9 Server RCE flaw now exploited in attacks"},"content":{"rendered":"\n<p>Hackers are exploiting an unauthenticated remote code execution (RCE) vulnerability in the Samsung MagicINFO 9 Server to hijack devices and deploy malware. Samsung MagicINFO Server is a centralized content management system (CMS) used to remotely manage and control digital signage displays made by Samsung. It is used by retail stores, airports, hospitals, corporate buildings, and restaurants, where there&#8217;s a need to schedule, distribute, display, and monitor multimedia content. The server component features a file upload functionality intended for updating display content, but hackers are abusing it to upload malicious code. The flaw, tracked under\u00a0CVE-2024-7399, was first publicly\u00a0disclosed in August 2024\u00a0when it was fixed as part of the release of version\u00a021.1050. The vendor described the vulnerability as an &#8220;Improper limitation of a pathname to a restricted directory vulnerability in Samsung MagicINFO 9 Server [that] allows attackers to write arbitrary file as system authority.&#8221;\u00a0 On April 30, 2025, security researchers at SSD-Disclosure published a\u00a0detailed write-up\u00a0along with a proof-of-concept (PoC) exploit that achieves RCE on the server without any authentication using a JSP web shell. The attacker uploads a malicious .jsp file via an unauthenticated POST request, exploiting path traversal to place it in a web-accessible location.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Contact us : <a href=\"tel:00218915579536\u202c\">0915579536\u202c<\/a><\/p>\n\n\n\n<p>Or on the website <a href=\"http:\/\/digitalonion.ly\" target=\"_blank\" rel=\"noreferrer noopener\">digitalonion.ly<\/a><\/p>\n\n\n\n<p><strong>Visit us at our company address: Tripoli \u2013 Andalus Street \u2013 Next to the Iraqi Embassy.<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/maps.app.goo.gl\/xtDNpMSSfVe7zC9t9?fbclid=IwZXh0bgNhZW0CMTAAAR0agjJLdY1fw8Svc0z1ODqZbUdA7iBvh0QACYyoRcdYQ4NGTYHbZ6bQGtg_aem_klwdVZms8wjhcVBzxmkYtw\">Company address on the map<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers are exploiting an unauthenticated remote code execution (RCE) vulnerability in the Samsung MagicINFO 9 [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":440,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[81],"tags":[],"class_list":["post-439","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-news"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.digitalonion.ly\/wp-content\/uploads\/2025\/05\/Untitled-1.jpeg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=\/wp\/v2\/posts\/439","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=439"}],"version-history":[{"count":1,"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=\/wp\/v2\/posts\/439\/revisions"}],"predecessor-version":[{"id":441,"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=\/wp\/v2\/posts\/439\/revisions\/441"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=\/wp\/v2\/media\/440"}],"wp:attachment":[{"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=439"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=439"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.digitalonion.ly\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}