CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

samsung

gear_s2_firmware

5 known vulnerabilities · sorted by CVSS score

CVE-2018-16272
CRITICAL9.8

The wpa_supplicant system service in Samsung Galaxy Gear series allows an unprivileged process to fully control the Wi-Fi interface, due to the lack of its D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.

samsung / galaxy_gear_firmware+9
Network
Published Jan 22, 2020
CVE-2021-25424
HIGH8.8

Improper authentication vulnerability in Tizen bluetooth-frwk prior to Firmware update JUN-2021 Release allows bluetooth attacker to take over the user's bluetooth device without user awareness.

samsung / galaxy_watch_active_2_firmware+8
Adjacent
Published Jun 11, 2021
CVE-2018-16270
HIGH7.5

Samsung Galaxy Gear series before build RE2 includes the hcidump utility with no privilege or permission restriction. This allows an unprivileged process to dump Bluetooth HCI packets to an arbitrary file path.

samsung / galaxy_gear_firmware+9
Network
Published Jan 22, 2020
CVE-2018-16269
HIGH7.5

The wnoti system service in Samsung Galaxy Gear series allows an unprivileged process to take over the internal notification message data, due to improper D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.

samsung / galaxy_gear_firmware+9
Network
Published Jan 22, 2020
CVE-2018-16271
MEDIUM6.5

The wemail_consumer_service (from the built-in application wemail) in Samsung Galaxy Gear series allows an unprivileged process to manipulate a user's mailbox, due to improper D-Bus security policy configurations. An arbitrary email can also be sent from the mailbox via the paired smartphone. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.

samsung / galaxy_gear_firmware+9
Adjacent
Published Jan 22, 2020