Use of a broken or risky cryptographic algorithm in Smart Switch prior to version 3.7.67.2 allows local attackers to replace the restoring application. User interaction is required for triggering this vulnerability.
                
            References
                    | Link | Resource | 
|---|---|
| https://security.samsungmobile.com/serviceWeb.smsb?year=2025&month=10 | Vendor Advisory | 
Configurations
                    History
                    28 Oct 2025, 15:39
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:samsung:smart_switch:*:*:*:*:*:*:*:* | |
| First Time | Samsung smart Switch Samsung | |
| References | () https://security.samsungmobile.com/serviceWeb.smsb?year=2025&month=10 - Vendor Advisory | |
| CWE | CWE-327 | 
10 Oct 2025, 07:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-10-10 07:15
Updated : 2025-10-28 15:39
NVD link : CVE-2025-21062
Mitre link : CVE-2025-21062
CVE.ORG link : CVE-2025-21062
JSON object : View
Products Affected
                samsung
- smart_switch
CWE
                
                    
                        
                        CWE-327
                        
            Use of a Broken or Risky Cryptographic Algorithm
