Samsung has begun rolling out its February 2026 Security Maintenance Release (SMR) to its portfolio of Galaxy devices. The update is a comprehensive package that addresses 37 security vulnerabilities. Of these, 25 are Common Vulnerabilities and Exposures (CVEs) inherited from Google's core Android Security Bulletin, while 12 are Samsung Vulnerabilities and Exposures (SVEs) that are specific to Samsung's custom One UI software and device hardware. The patches cover a range of issues, with some of the Samsung-specific flaws rated as 'High' severity. Users should install this update as soon as it becomes available to protect their devices from potential exploitation.
The February 2026 SMR is a cumulative update that includes:
While a full list of all 37 flaws is extensive, Samsung highlighted one of the SVEs it resolved:
The other SVEs are rated as 'High' and 'Moderate' severity, indicating they could have a significant impact if exploited.
The update will be rolled out to all supported Samsung Galaxy devices, including:
The exact timing of the update will vary by device model, country, and carrier.
Security updates for mobile devices are critical because they address flaws that could be exploited by malicious applications or remote attackers to gain control of a device, steal personal data, or conduct surveillance. The 'High' severity rating for some of the patched vulnerabilities indicates that they could be exploited with relative ease or could lead to a significant compromise, such as privilege escalation or access to sensitive user data. Delaying the update leaves the device and its data exposed to these known risks.
This is a mandatory security update. All users should install it as soon as they receive the notification on their device. There is no reason to delay the installation. Organizations managing fleets of Samsung devices should push the update through their Mobile Device Management (MDM) solution.
Most users will receive an over-the-air (OTA) notification to download and install the update.
Settings on your Galaxy device.Software update.Download and install.It is recommended to be connected to a Wi-Fi network and have sufficient battery life before starting the update.
Installing the monthly security update is the only way to remediate the vulnerabilities addressed in the patch.
Mapped D3FEND Techniques:
The only effective countermeasure is to promptly install the February 2026 security update on all affected Samsung Galaxy devices. Users should enable automatic updates where possible or manually check for the update via 'Settings > Software update'. For corporate environments, Mobile Device Management (MDM) administrators must prioritize pushing this update to their entire fleet of Samsung devices. Given that the update patches 'High' severity flaws, delaying installation creates an unnecessary window of risk where a device could be compromised by a malicious app or a remote exploit targeting one of the 37 now-public vulnerabilities. Applying the software update is a fundamental security hygiene practice that directly removes the underlying flaws.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats