Use of a broken or risky cryptographic algorithm in Smart Switch prior to version 3.7.69.15 allows remote attackers to configure a downgraded scheme for authentication.
References
| Link | Resource |
|---|---|
| https://security.samsungmobile.com/serviceWeb.smsb?year=2026&month=03 | Vendor Advisory |
Configurations
History
31 Mar 2026, 00:29
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| First Time |
Samsung
Samsung smart Switch |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
| References | () https://security.samsungmobile.com/serviceWeb.smsb?year=2026&month=03 - Vendor Advisory | |
| CPE | cpe:2.3:a:samsung:smart_switch:*:*:*:*:*:*:*:* | |
| CWE | CWE-327 |
16 Mar 2026, 14:18
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-16 14:18
Updated : 2026-03-31 00:29
NVD link : CVE-2026-20996
Mitre link : CVE-2026-20996
CVE.ORG link : CVE-2026-20996
JSON object : View
Products Affected
samsung
- smart_switch
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
