Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25073: n/a

0
Medium
VulnerabilityCVE-2024-25073cvecve-2024-25073
Published: Tue Sep 10 2024 (09/10/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Samsung Semiconductor Mobile Processor and Modem Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, Exynos Modem 5300. The baseband software does not properly check a pointer specified by the CC (Call Control module), which can lead to Denial of Service (Untrusted Pointer Dereference).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 09:36:03 UTC

Technical Analysis

CVE-2024-25073 is a vulnerability identified in the baseband software of numerous Samsung Exynos processors and modems, including models such as Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 2200, 1280, 1380, 1330, 9110, W920, W930, and modems 5123 and 5300. The root cause is an improper check of a pointer specified by the Call Control (CC) module within the baseband software. Specifically, the software fails to validate the pointer correctly, which can lead to an untrusted pointer dereference. This flaw can be exploited to cause a denial of service (DoS) condition by crashing or destabilizing the baseband processor, which is critical for cellular communication functions. The vulnerability does not affect confidentiality or integrity, and no privileges or user interaction are required to exploit it; however, the attack complexity is high, meaning exploitation is non-trivial. The baseband software operates at a low level managing cellular communications, so a DoS here could disrupt voice, data, and other cellular services on affected devices. No patches or known exploits have been reported at the time of publication. The vulnerability is tracked under CWE-476 (NULL Pointer Dereference). The CVSS v3.1 score is 5.9 (medium severity), reflecting the high complexity and limited impact scope.

Potential Impact

The primary impact of CVE-2024-25073 is denial of service affecting the availability of cellular communication on devices using vulnerable Samsung Exynos processors and modems. This could manifest as dropped calls, loss of data connectivity, or device instability requiring reboot. For individual users, this results in degraded mobile experience and potential communication outages. For organizations, especially those relying on mobile communications for critical operations, this could disrupt business continuity, emergency communications, or field operations. The vulnerability does not compromise data confidentiality or integrity, so information theft or manipulation is not a concern here. However, the baseband processor is a critical component, and denial of service could have cascading effects on device usability. Since exploitation requires no privileges or user interaction but has high attack complexity, widespread automated attacks are less likely but targeted attacks against high-value targets remain possible. The lack of known exploits reduces immediate risk but vigilance is necessary. The impact is global due to the widespread use of Samsung Exynos chips in mobile devices worldwide.

Mitigation Recommendations

To mitigate CVE-2024-25073, organizations and users should: 1) Monitor Samsung and device manufacturers for official patches or firmware updates addressing this vulnerability and apply them promptly. 2) Employ mobile device management (MDM) solutions to enforce timely updates and monitor device health. 3) Limit exposure by restricting untrusted network access where possible, as exploitation targets the baseband software. 4) Use network-level protections such as anomaly detection to identify unusual cellular traffic patterns that might indicate exploitation attempts. 5) For critical deployments, consider fallback communication methods in case of cellular service disruption. 6) Engage with device vendors to confirm patch availability and deployment timelines. 7) Educate users about the importance of installing updates and reporting device instability. Since no patches are currently available, temporary mitigations focus on detection and limiting attack surface. Avoid installing untrusted baseband firmware or software. Regularly audit device inventories to identify those with affected Exynos processors and prioritize them for updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-04T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d5eb7ef31ef0b570c12

Added to database: 2/25/2026, 9:45:02 PM

Last enriched: 2/28/2026, 9:36:03 AM

Last updated: 4/12/2026, 7:54:49 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses