CVE-2024-25074: n/a
An issue was discovered in Samsung Semiconductor Mobile Processor and Modem Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, Exynos Modem 5300. The baseband software does not properly check a pointer specified by the SM (Session Management module), which can lead to Denial of Service (Untrusted Pointer Dereference).
AI Analysis
Technical Summary
CVE-2024-25074 is a vulnerability identified in the baseband software of various Samsung Semiconductor Mobile Processors and Modems, including Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 2200, 1280, 1380, 1330, 9110, W920, W930, and modems 5123 and 5300. The issue stems from the Session Management (SM) module failing to properly validate a pointer it receives, resulting in an untrusted pointer dereference. This improper pointer check can cause the baseband software to crash or become unresponsive, leading to a Denial of Service (DoS) condition. The vulnerability does not affect confidentiality or integrity but impacts availability by disrupting mobile network connectivity or device operation. The CVSS v3.1 score is 5.9 (medium), reflecting the high attack complexity and the fact that no privileges or user interaction are required. The attack vector is network-based, meaning an attacker could exploit this remotely by sending crafted signaling messages to the vulnerable baseband. The flaw is categorized under CWE-763 (Improper Check or Handling of Exceptional Conditions). Currently, no public exploits or patches have been reported, but given the widespread use of these Exynos chipsets in Samsung smartphones and IoT devices, the vulnerability poses a tangible risk to mobile device availability and network reliability.
Potential Impact
The primary impact of CVE-2024-25074 is Denial of Service on devices using affected Samsung Exynos processors and modems. This can result in temporary or prolonged loss of mobile network connectivity, affecting voice, data, and SMS services. For individual users, this means device unavailability and communication disruption. For organizations, especially those relying on Samsung mobile devices for critical communications or IoT deployments, this could lead to operational interruptions, reduced productivity, and potential safety risks if devices are used in sensitive environments. Network operators may also experience increased support calls and degraded service quality. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact can be significant in contexts where continuous mobile connectivity is essential. The high attack complexity reduces the likelihood of widespread exploitation, but targeted attacks against high-value individuals or critical infrastructure remain a concern.
Mitigation Recommendations
To mitigate CVE-2024-25074, organizations and users should: 1) Monitor Samsung and mobile carriers for official firmware or baseband software updates addressing this vulnerability and apply them promptly once released. 2) Employ network-level filtering and anomaly detection to identify and block suspicious or malformed signaling messages targeting the baseband. 3) Limit exposure of vulnerable devices to untrusted networks, especially public or unsecured Wi-Fi and cellular networks. 4) For enterprise deployments, consider mobile device management (MDM) solutions to enforce timely patching and monitor device health. 5) Collaborate with mobile network operators to ensure they implement safeguards against signaling-based attacks. 6) Educate users about the importance of installing updates and avoiding risky network environments. Since no patches are currently available, proactive network defense and monitoring are critical interim measures.
Affected Countries
United States, South Korea, India, Germany, United Kingdom, France, Brazil, Russia, Japan, China, Australia, Canada, Italy, Spain
CVE-2024-25074: n/a
Description
An issue was discovered in Samsung Semiconductor Mobile Processor and Modem Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, Exynos Modem 5300. The baseband software does not properly check a pointer specified by the SM (Session Management module), which can lead to Denial of Service (Untrusted Pointer Dereference).
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-25074 is a vulnerability identified in the baseband software of various Samsung Semiconductor Mobile Processors and Modems, including Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 2200, 1280, 1380, 1330, 9110, W920, W930, and modems 5123 and 5300. The issue stems from the Session Management (SM) module failing to properly validate a pointer it receives, resulting in an untrusted pointer dereference. This improper pointer check can cause the baseband software to crash or become unresponsive, leading to a Denial of Service (DoS) condition. The vulnerability does not affect confidentiality or integrity but impacts availability by disrupting mobile network connectivity or device operation. The CVSS v3.1 score is 5.9 (medium), reflecting the high attack complexity and the fact that no privileges or user interaction are required. The attack vector is network-based, meaning an attacker could exploit this remotely by sending crafted signaling messages to the vulnerable baseband. The flaw is categorized under CWE-763 (Improper Check or Handling of Exceptional Conditions). Currently, no public exploits or patches have been reported, but given the widespread use of these Exynos chipsets in Samsung smartphones and IoT devices, the vulnerability poses a tangible risk to mobile device availability and network reliability.
Potential Impact
The primary impact of CVE-2024-25074 is Denial of Service on devices using affected Samsung Exynos processors and modems. This can result in temporary or prolonged loss of mobile network connectivity, affecting voice, data, and SMS services. For individual users, this means device unavailability and communication disruption. For organizations, especially those relying on Samsung mobile devices for critical communications or IoT deployments, this could lead to operational interruptions, reduced productivity, and potential safety risks if devices are used in sensitive environments. Network operators may also experience increased support calls and degraded service quality. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact can be significant in contexts where continuous mobile connectivity is essential. The high attack complexity reduces the likelihood of widespread exploitation, but targeted attacks against high-value individuals or critical infrastructure remain a concern.
Mitigation Recommendations
To mitigate CVE-2024-25074, organizations and users should: 1) Monitor Samsung and mobile carriers for official firmware or baseband software updates addressing this vulnerability and apply them promptly once released. 2) Employ network-level filtering and anomaly detection to identify and block suspicious or malformed signaling messages targeting the baseband. 3) Limit exposure of vulnerable devices to untrusted networks, especially public or unsecured Wi-Fi and cellular networks. 4) For enterprise deployments, consider mobile device management (MDM) solutions to enforce timely patching and monitor device health. 5) Collaborate with mobile network operators to ensure they implement safeguards against signaling-based attacks. 6) Educate users about the importance of installing updates and avoiding risky network environments. Since no patches are currently available, proactive network defense and monitoring are critical interim measures.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-02-04T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d5fb7ef31ef0b570c68
Added to database: 2/25/2026, 9:45:03 PM
Last enriched: 2/26/2026, 10:28:14 AM
Last updated: 4/12/2026, 1:08:53 AM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.