Magician Samsung Magician

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Samsung Magician.

By the Year

In 2026 there have been 0 vulnerabilities in Samsung Magician. Magician did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 4 5.63

It may take a day or so for new Magician vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Samsung Magician Security Vulnerabilities

Samsung Magician Installer Symbolic Link Vulnerability
CVE-2024-53921 2.8 - Low - December 03, 2024

An issue was discovered in the installer in Samsung Magician 8.1.0 on Windows. An attacker can create arbitrary folders in the system permission directory via a symbolic link during the installation process.

Privilege Escalation in Samsung Magician 8.0.0 via Untrusted DLL Search Path
CVE-2024-36071 6.3 - Medium - June 20, 2024

Samsung Magician 8.0.0 on Windows allows an admin to escalate privileges by tampering with the directory and DLL files used during the installation process. This occurs because of an Untrusted Search Path.

Privilege Escalation in Samsung Magician 8.0.0 macOS via Install Tampering
CVE-2024-31953 6.7 - Medium - May 14, 2024

An issue was discovered in Samsung Magician 8.0.0 on macOS. Because it is possible to tamper with the directory and executable files used during the installation process, an attacker can escalate privileges through arbitrary code execution. (The attacker must already have user privileges, and an administrator password must be entered during the program installation stage for privilege escalation.)

Samsung Magician 8.0.0 - PrivEsc via Symlink during Install
CVE-2024-31952 6.7 - Medium - May 14, 2024

An issue was discovered in Samsung Magician 8.0.0 on macOS. Because symlinks are used during the installation process, an attacker can escalate privileges via arbitrary file permission writes. (The attacker must already have user privileges, and an administrator password must be entered during the program installation stage for privilege escalation.)

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Samsung Magician or by Samsung? Click the Watch button to subscribe.

Samsung
Vendor

subscribe