Executive Summary

Title Samsung Magician fails to update itself securely
Name VU#846320 First vendor Publication 2017-06-15
Vendor VU-CERT Last vendor Modification 2017-06-16
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:A/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 8.3 Attack Range Adjacent network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 6.5 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Vulnerability Note VU#846320

Samsung Magician fails to update itself securely

Original Release date: 15 Jun 2017 | Last revised: 15 Jun 2017


Samsung Magician fails to securely check for and retrieve updates, which an allow an authenticated attacker to execute arbitrary code with administrator privileges.


Samsung Magician is a management utility for Samsung SSDs. Prior to version 5.0, Samsung Magician checks for and retrieves updates over HTTP. Prior to version 5.1, Samsung Magician uses HTTPS to perform update operations, however it does not validate SSL certificates.


An attacker on the same network as, or who can otherwise affect network traffic from, a Samsung Magician user can cause the Magician update process to execute arbitrary code with system administrator privileges.


Apply an update

This issue is addressed in Samsung Magician 5.1. Note that because the update mechanism is vulnerable, do not use the self-update mechanism for Samsung Magician to obtain the fixed version.

Avoid untrusted networks

Avoid using untrusted networks, including public WiFi. Using your device on an untrusted network increases the chance of falling victim to a MITM attack.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Samsung MemoryAffected24 Apr 201715 Jun 2017
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)



  • https://vuls.cert.org/confluence/display/tools/CERT+Tapioca
  • https://www.samsung.com/semiconductor/minisite/ssd/product/consumer/magician.html
  • http://www.samsung.com/semiconductor/minisite/ssd/download/tools.html


This vulnerability was reported by Will Dormann of the CERT/CC.

This document was written by Will Dormann.

Other Information

  • CVE IDs:CVE-2017-3218
  • Date Public:15 Jun 2017
  • Date First Published:15 Jun 2017
  • Date Last Updated:15 Jun 2017
  • Document Revision:11


If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/846320

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-345 Insufficient Verification of Data Authenticity

CPE : Common Platform Enumeration

Application 1

Alert History

If you want to see full details history, please login or register.
Date Informations
2017-07-04 00:25:04
  • Multiple Updates
2017-06-22 05:23:34
  • Multiple Updates
2017-06-16 21:22:10
  • First insertion