Samsung

Samsung

Samsung acknowledged that certain Galaxy devices running One UI retain clipboard contents—including passwords copied from password managers—in plaintext indefinitely. A user reported that sensitive credentials remain accessible until manually cleared, creating a potential treasure trove for malware or malicious apps. Samsung advised manual clipboard clearing and secure input methods while promising to evaluate auto-clear or exclusion features in a future update.

Source: https://www.theregister.com/2025/04/28/security_news_in_brief/

TPRM report: https://scoringcyber.rankiteo.com/company/samsungmobile

"id": "sam600042825",
"linkid": "samsungmobile",
"type": "Vulnerability",
"date": "4/2025",
"severity": "25",
"impact": "1",
"explanation": "Attack without any consequences"
{'affected_entities': [{'industry': 'Electronics',
                        'location': 'Global',
                        'name': 'Samsung',
                        'type': 'Corporation'}],
 'attack_vector': 'Clipboard data retention',
 'data_breach': {'sensitivity_of_data': 'High',
                 'type_of_data_compromised': ['Sensitive credentials',
                                              'Passwords']},
 'description': 'Samsung acknowledged that certain Galaxy devices running One '
                'UI retain clipboard contents—including passwords copied from '
                'password managers—in plaintext indefinitely. A user reported '
                'that sensitive credentials remain accessible until manually '
                'cleared, creating a potential treasure trove for malware or '
                'malicious apps. Samsung advised manual clipboard clearing and '
                'secure input methods while promising to evaluate auto-clear '
                'or exclusion features in a future update.',
 'impact': {'data_compromised': ['Sensitive credentials', 'Passwords'],
            'systems_affected': ['Galaxy devices running One UI']},
 'response': {'remediation_measures': ['Manual clipboard clearing',
                                       'Secure input methods']},
 'title': 'Samsung Clipboard Vulnerability',
 'type': 'Vulnerability',
 'vulnerability_exploited': 'Plaintext clipboard retention'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.