Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25074: n/a

0
Medium
VulnerabilityCVE-2024-25074cvecve-2024-25074
Published: Tue Sep 10 2024 (09/10/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-25074 is a medium severity vulnerability affecting multiple Samsung Exynos mobile processors and modems. It arises from improper pointer validation in the baseband software's Session Management (SM) module, leading to untrusted pointer dereference and potential Denial of Service (DoS). The flaw does not impact confidentiality or integrity but can cause service disruption without requiring user interaction or privileges. Exploitation is remote network-based but requires high attack complexity. No known exploits are currently reported in the wild. This vulnerability primarily affects devices using the listed Exynos chipsets, which are widely deployed in Samsung smartphones and IoT devices. Organizations relying on these devices should monitor for patches and apply them promptly once available. Mitigation involves updating baseband firmware and employing network-level protections to limit exposure to malicious signaling messages. Countries with significant Samsung device usage and strategic interest in mobile security are at higher risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 10:28:14 UTC

Technical Analysis

CVE-2024-25074 is a vulnerability identified in the baseband software of various Samsung Semiconductor Mobile Processors and Modems, including Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 2200, 1280, 1380, 1330, 9110, W920, W930, and modems 5123 and 5300. The issue stems from the Session Management (SM) module failing to properly validate a pointer it receives, resulting in an untrusted pointer dereference. This improper pointer check can cause the baseband software to crash or become unresponsive, leading to a Denial of Service (DoS) condition. The vulnerability does not affect confidentiality or integrity but impacts availability by disrupting mobile network connectivity or device operation. The CVSS v3.1 score is 5.9 (medium), reflecting the high attack complexity and the fact that no privileges or user interaction are required. The attack vector is network-based, meaning an attacker could exploit this remotely by sending crafted signaling messages to the vulnerable baseband. The flaw is categorized under CWE-763 (Improper Check or Handling of Exceptional Conditions). Currently, no public exploits or patches have been reported, but given the widespread use of these Exynos chipsets in Samsung smartphones and IoT devices, the vulnerability poses a tangible risk to mobile device availability and network reliability.

Potential Impact

The primary impact of CVE-2024-25074 is Denial of Service on devices using affected Samsung Exynos processors and modems. This can result in temporary or prolonged loss of mobile network connectivity, affecting voice, data, and SMS services. For individual users, this means device unavailability and communication disruption. For organizations, especially those relying on Samsung mobile devices for critical communications or IoT deployments, this could lead to operational interruptions, reduced productivity, and potential safety risks if devices are used in sensitive environments. Network operators may also experience increased support calls and degraded service quality. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact can be significant in contexts where continuous mobile connectivity is essential. The high attack complexity reduces the likelihood of widespread exploitation, but targeted attacks against high-value individuals or critical infrastructure remain a concern.

Mitigation Recommendations

To mitigate CVE-2024-25074, organizations and users should: 1) Monitor Samsung and mobile carriers for official firmware or baseband software updates addressing this vulnerability and apply them promptly once released. 2) Employ network-level filtering and anomaly detection to identify and block suspicious or malformed signaling messages targeting the baseband. 3) Limit exposure of vulnerable devices to untrusted networks, especially public or unsecured Wi-Fi and cellular networks. 4) For enterprise deployments, consider mobile device management (MDM) solutions to enforce timely patching and monitor device health. 5) Collaborate with mobile network operators to ensure they implement safeguards against signaling-based attacks. 6) Educate users about the importance of installing updates and avoiding risky network environments. Since no patches are currently available, proactive network defense and monitoring are critical interim measures.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-04T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d5fb7ef31ef0b570c68

Added to database: 2/25/2026, 9:45:03 PM

Last enriched: 2/26/2026, 10:28:14 AM

Last updated: 2/26/2026, 10:46:06 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats