If you have a Samsung Galaxy, drop everything and check for a software update. Samsung has issued an update for a zero‑day vulnerability that is currently being exploited by attackers. Delaying the patch leaves your device vulnerable to remote code execution.
Carrying the identifier CVE‑2025‑21043, the vulnerability exists in Samsung’s Android catalog and targets an image‑decoding library named libimagecodec.quram.so. The bug, which Samsung Mobile Security rates at its highest criticality designation with a base score of 8.8 and labels as an arbitrary code execution vulnerability, would allow a remote attacker to execute malicious code on your phone simply by getting a crafted image to pass through your system.
- A critical vulnerability that’s already under attack
- How this Samsung image‑decoder vulnerability works
- Who should update their Samsung Galaxy phone now
- How to apply Samsung’s security update and verify
- Practical defenses you can turn on today before patching
- Why fast updates matter during active exploitation

A critical vulnerability that’s already under attack
Meta’s and WhatsApp’s security teams privately notified Samsung of active exploitation of the bug, which means real‑world attacks, not merely a theoretical threat. The advisory from Samsung says the vulnerability affects devices with Android 13, 14, 15, and 16 installed, and that the patch is making its way to affected users via the company’s normal Security Maintenance Release channel.
What makes this class of bug so dangerous is the target: image parsing. Modern phones process images automatically in myriad places — apps, social feeds, email previews, and even some notifications. An “out‑of‑bounds write” in an image codec can be exploited by a malicious file to cause memory corruption, which attackers leverage to gain control of the device.
How this Samsung image‑decoder vulnerability works
Libimagecodec.quram.so by Quramsoft is responsible for decoding different image formats on Samsung devices. CVE‑2025‑21043 is due to insufficient boundary checks when parsing. If a hacker could trick an insecure app into decoding an image crafted specifically to exploit the vulnerability, they might be able to take control of that app and run their own code in it. And, depending on the app and sandboxing limits, that may itself be used to steal data from your phone, install spyware, or further attack it with additional privilege‑escalation tricks.
There’s precedent here. Bugs involving parsing of images and media have been a fertile ground for well‑funded attacks for ages. Android’s Stagefright period taught us how MMS could be the vector of silent compromises, and Samsung has addressed image‑related issues like CVE‑2020‑8899 in the past. From the Apple side of the world, a recent memory corruption bug, CVE‑2025‑43300, demonstrated yet another ecosystem can be at risk. Commercial spyware vendors, as security labs have repeatedly documented, favor these “zero‑click” or “one‑click” vectors.
Who should update their Samsung Galaxy phone now
If you have an Android smartphone made by Samsung and running Android 13 to 16, assume you are affected and take action as soon as possible. Samsung hasn’t released a fully detailed, model‑by‑model list of affected devices, but since the vulnerable library sees widespread use on Galaxy models, your best bet is to install whatever security update is available as soon as it’s available. Considering Samsung’s scale — the company accounts for about a fifth of global smartphone shipments, according to IDC — that’s a huge pool of vulnerable consumers.

How to apply Samsung’s security update and verify
- Open Settings > Software update > Download and install.
- Stay on Wi‑Fi, ensure your battery is over 50%, and reboot when prompted.
- Verify installation in Settings > About phone > Software information, and confirm your Android security patch level shows the most recent date for your device.
Also update your apps. Visit Google Play and the Galaxy Store to update WhatsApp and other messaging apps. App‑side mitigations occasionally limit exposure by narrowing how media is fetched and processed, and vendors frequently ship corresponding fixes alongside OS patches.
Practical defenses you can turn on today before patching
Until your phone gets the patch, be wary of image auto‑processing.
- Turn off automatic media downloads from unknown senders in your messaging apps.
- In Samsung Messages, disable MMS auto‑retrieve.
- Don’t open images from people you don’t know.
- Don’t sideload APKs that might contain exploit‑laden media.
Keep Google Play Protect turned on and make sure your devices are backed up in case recovery is needed. On some newer Galaxy devices, Samsung’s Message Guard adds an extra sandbox around images within a few popular messaging apps; make sure it’s turned on where available, but think of it more as a safety net, not a replacement for patching.
Why fast updates matter during active exploitation
Attackers quickly move when a zero‑day flaw is in play, and exploit writers often echo the same technique across platforms and apps. Samsung’s validation of in‑the‑wild abuse raises this to more than routine maintenance; it becomes urgent risk mitigation. Install the security update as soon as you can, then leave automatic updates on so that you’re not exposed next time a media parsing bug pops up to bite us.
The bottom line is that this is a high‑impact, actively exploited vulnerability, and the vendor has released an update. Update your Samsung phone today, and for an extra layer of defense, tighten up its messaging app settings.