CVE-2024-25073: n/a
An issue was discovered in Samsung Semiconductor Mobile Processor and Modem Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, Exynos Modem 5300. The baseband software does not properly check a pointer specified by the CC (Call Control module), which can lead to Denial of Service (Untrusted Pointer Dereference).
AI Analysis
Technical Summary
CVE-2024-25073 is a vulnerability identified in the baseband software of numerous Samsung Exynos processors and modems, including models such as Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 2200, 1280, 1380, 1330, 9110, W920, W930, and modems 5123 and 5300. The root cause is an improper check of a pointer specified by the Call Control (CC) module within the baseband software. Specifically, the software fails to validate the pointer correctly, which can lead to an untrusted pointer dereference. This flaw can be exploited to cause a denial of service (DoS) condition by crashing or destabilizing the baseband processor, which is critical for cellular communication functions. The vulnerability does not affect confidentiality or integrity, and no privileges or user interaction are required to exploit it; however, the attack complexity is high, meaning exploitation is non-trivial. The baseband software operates at a low level managing cellular communications, so a DoS here could disrupt voice, data, and other cellular services on affected devices. No patches or known exploits have been reported at the time of publication. The vulnerability is tracked under CWE-476 (NULL Pointer Dereference). The CVSS v3.1 score is 5.9 (medium severity), reflecting the high complexity and limited impact scope.
Potential Impact
The primary impact of CVE-2024-25073 is denial of service affecting the availability of cellular communication on devices using vulnerable Samsung Exynos processors and modems. This could manifest as dropped calls, loss of data connectivity, or device instability requiring reboot. For individual users, this results in degraded mobile experience and potential communication outages. For organizations, especially those relying on mobile communications for critical operations, this could disrupt business continuity, emergency communications, or field operations. The vulnerability does not compromise data confidentiality or integrity, so information theft or manipulation is not a concern here. However, the baseband processor is a critical component, and denial of service could have cascading effects on device usability. Since exploitation requires no privileges or user interaction but has high attack complexity, widespread automated attacks are less likely but targeted attacks against high-value targets remain possible. The lack of known exploits reduces immediate risk but vigilance is necessary. The impact is global due to the widespread use of Samsung Exynos chips in mobile devices worldwide.
Mitigation Recommendations
To mitigate CVE-2024-25073, organizations and users should: 1) Monitor Samsung and device manufacturers for official patches or firmware updates addressing this vulnerability and apply them promptly. 2) Employ mobile device management (MDM) solutions to enforce timely updates and monitor device health. 3) Limit exposure by restricting untrusted network access where possible, as exploitation targets the baseband software. 4) Use network-level protections such as anomaly detection to identify unusual cellular traffic patterns that might indicate exploitation attempts. 5) For critical deployments, consider fallback communication methods in case of cellular service disruption. 6) Engage with device vendors to confirm patch availability and deployment timelines. 7) Educate users about the importance of installing updates and reporting device instability. Since no patches are currently available, temporary mitigations focus on detection and limiting attack surface. Avoid installing untrusted baseband firmware or software. Regularly audit device inventories to identify those with affected Exynos processors and prioritize them for updates.
Affected Countries
South Korea, United States, India, Germany, United Kingdom, Brazil, Russia, China, Japan, France, Canada, Australia, Mexico
CVE-2024-25073: n/a
Description
An issue was discovered in Samsung Semiconductor Mobile Processor and Modem Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, Exynos Modem 5300. The baseband software does not properly check a pointer specified by the CC (Call Control module), which can lead to Denial of Service (Untrusted Pointer Dereference).
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-25073 is a vulnerability identified in the baseband software of numerous Samsung Exynos processors and modems, including models such as Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 2200, 1280, 1380, 1330, 9110, W920, W930, and modems 5123 and 5300. The root cause is an improper check of a pointer specified by the Call Control (CC) module within the baseband software. Specifically, the software fails to validate the pointer correctly, which can lead to an untrusted pointer dereference. This flaw can be exploited to cause a denial of service (DoS) condition by crashing or destabilizing the baseband processor, which is critical for cellular communication functions. The vulnerability does not affect confidentiality or integrity, and no privileges or user interaction are required to exploit it; however, the attack complexity is high, meaning exploitation is non-trivial. The baseband software operates at a low level managing cellular communications, so a DoS here could disrupt voice, data, and other cellular services on affected devices. No patches or known exploits have been reported at the time of publication. The vulnerability is tracked under CWE-476 (NULL Pointer Dereference). The CVSS v3.1 score is 5.9 (medium severity), reflecting the high complexity and limited impact scope.
Potential Impact
The primary impact of CVE-2024-25073 is denial of service affecting the availability of cellular communication on devices using vulnerable Samsung Exynos processors and modems. This could manifest as dropped calls, loss of data connectivity, or device instability requiring reboot. For individual users, this results in degraded mobile experience and potential communication outages. For organizations, especially those relying on mobile communications for critical operations, this could disrupt business continuity, emergency communications, or field operations. The vulnerability does not compromise data confidentiality or integrity, so information theft or manipulation is not a concern here. However, the baseband processor is a critical component, and denial of service could have cascading effects on device usability. Since exploitation requires no privileges or user interaction but has high attack complexity, widespread automated attacks are less likely but targeted attacks against high-value targets remain possible. The lack of known exploits reduces immediate risk but vigilance is necessary. The impact is global due to the widespread use of Samsung Exynos chips in mobile devices worldwide.
Mitigation Recommendations
To mitigate CVE-2024-25073, organizations and users should: 1) Monitor Samsung and device manufacturers for official patches or firmware updates addressing this vulnerability and apply them promptly. 2) Employ mobile device management (MDM) solutions to enforce timely updates and monitor device health. 3) Limit exposure by restricting untrusted network access where possible, as exploitation targets the baseband software. 4) Use network-level protections such as anomaly detection to identify unusual cellular traffic patterns that might indicate exploitation attempts. 5) For critical deployments, consider fallback communication methods in case of cellular service disruption. 6) Engage with device vendors to confirm patch availability and deployment timelines. 7) Educate users about the importance of installing updates and reporting device instability. Since no patches are currently available, temporary mitigations focus on detection and limiting attack surface. Avoid installing untrusted baseband firmware or software. Regularly audit device inventories to identify those with affected Exynos processors and prioritize them for updates.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-02-04T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d5eb7ef31ef0b570c12
Added to database: 2/25/2026, 9:45:02 PM
Last enriched: 2/28/2026, 9:36:03 AM
Last updated: 4/12/2026, 7:54:49 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.