Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    It is reportedly allegedly scrapping websites, it is not believed again

    August 5, 2025

    Jeh Aerospace Net $ 11m to score the supply chain of commercial aircraft in India

    August 5, 2025

    Trump CFTC Pick Brian Quintage questioned Kalshi relations

    August 5, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Samsung Magicinfo 9 Server RCE Dosha is now exploited in attacks
    Security

    Samsung Magicinfo 9 Server RCE Dosha is now exploited in attacks

    PineapplesUpdateBy PineapplesUpdateMay 7, 2025No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Samsung Magicinfo 9 Server RCE Dosha is now exploited in attacks
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Samsung Magicinfo 9 Server RCE Dosha is now exploited in attacks

    Hackers are exploiting an informal remote code execution (RCE) vulnerability to deploy kidnapping equipment and malware in the Samsung Magicinfo 9 server.

    The Samsung Magicinfo Server is a centralized material management system (CMS) used to manage and control the digital signage display made by Samsung. It is used by retail stores, airports, hospitals, corporate buildings and restaurants, where multimedia material is required to schedule, distribute, display and monitor.

    The server component has a file upload functionality to update the performance material, but hackers are abusing it to upload malicious code.

    Defended, tracked under Cve-2024-7399Earlier public was Revealed in August 2024 When it was fixed as part of the release of version 21.1050.

    The seller allows the vulnerability to “Samsung Magicinfo 9 server (that) described as an inappropriate range of a patname for vulgarity (which) allows the attackers to write arbitrary file as a system authority.”

    On 30 April 2025, SSD-Disclose published by security researchers Detailed writing With a proof-off-concept (POC) exploitation that receives RCE on the server without any authentication using JSP web shell.

    The attacker uploads a malicious .JSP file through a malicious post request, exploiting the path traversal to place it in a web-accessible place.

    By visiting the file uploaded with the CMD parameter, they can execute the arbitrary OS command and see the output in the browser.

    Arctic Wolf Now reports that the CVE -2024-7399 defects have been actively exploited in attacks a few days after the release of POC, showing that the danger actors have adopted the method of attack in real operations.

    “Given the low obstruction for exploitation and the availability of a public POC, the danger actors are likely to continue to target this vulnerability,” Arctic wolf warned,

    Another active exploitation confirms comes from the danger analyst Johannes UlrichThose who took advantage of the CVE-2024-7399 to handle the device and told Mirai Botnet Malware Variant.

    Given the state of active exploitation of the defect, it is recommended that the system administrator take immediate action to patches the CVE-2024-7399 by upgrading the Samsung Magicinfo server to 21.1050 or later to the version.


    Red Report 2025

    Based on the analysis of 14M malicious tasks, search for the top 10 MITERAT & CK techniques behind the 93% attacks and how to defend them against them.

    attacks Dosha exploited Magicinfo RCE Samsung server
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleHow to use hot soup function on vitamics essent x5
    Next Article Patron’s app can now accept web payment after a change in US app store
    PineapplesUpdate
    • Website

    Related Posts

    Security

    Certain bug leaked in proton log fixes the totup secrets

    August 5, 2025
    Security

    Rainmware attacks: danger of developing US financial institutions

    August 5, 2025
    Security

    Anthropic AI wants to stop the model from evil – how is here

    August 4, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    It is reportedly allegedly scrapping websites, it is not believed again

    August 5, 2025

    Jeh Aerospace Net $ 11m to score the supply chain of commercial aircraft in India

    August 5, 2025

    Trump CFTC Pick Brian Quintage questioned Kalshi relations

    August 5, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.