Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28067: n/a

0
Medium
VulnerabilityCVE-2024-28067cvecve-2024-28067
Published: Tue Jul 09 2024 (07/09/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A vulnerability in Samsung Exynos Modem 5300 allows a Man-in-the-Middle (MITM) attacker to downgrade the security mode of packets going to the victim, enabling the attacker to send messages to the victim in plaintext.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 10:16:32 UTC

Technical Analysis

CVE-2024-28067 is a vulnerability identified in the Samsung Exynos Modem 5300 chipset, which is widely used in mobile devices. The flaw allows a Man-in-the-Middle (MITM) attacker to downgrade the security mode of packets destined for the victim device. By exploiting this vulnerability, the attacker can force the communication to revert from a secure encrypted mode to an unencrypted or less secure mode, enabling interception and injection of messages in plaintext. This vulnerability stems from improper certificate validation or insufficient enforcement of security mode negotiation protocols, categorized under CWE-295 (Improper Certificate Validation). The attack vector requires the attacker to have network access, typically within the same network or via a compromised network node, but does not require user interaction or elevated privileges on the victim device. The CVSS 3.1 base score is 5.3, reflecting medium severity with high impact on message integrity but no direct impact on confidentiality or availability. No known exploits have been reported in the wild, and no patches have been officially released at the time of publication. The vulnerability affects the integrity of communications, potentially allowing attackers to inject malicious messages or commands, disrupt services, or perform further targeted attacks. The lack of authentication requirements and user interaction lowers the attack complexity but limits the scope to attackers with network proximity or control. This vulnerability highlights the risks in modem security protocols and the importance of robust cryptographic enforcement in mobile communication hardware.

Potential Impact

The primary impact of CVE-2024-28067 is on the integrity of communications between mobile devices using the Samsung Exynos Modem 5300. An attacker capable of performing a MITM attack can downgrade the security mode, causing messages to be transmitted in plaintext. This can lead to message injection, manipulation, or spoofing, potentially disrupting services or enabling further exploitation. While confidentiality is not directly compromised by this vulnerability, the ability to inject messages can facilitate phishing, command injection, or denial of service attacks. Organizations relying on mobile communications for sensitive operations, including government, financial, and critical infrastructure sectors, may face increased risks of targeted attacks or espionage. The vulnerability's requirement for network-level access limits its exploitation to attackers with proximity or control over network infrastructure, such as malicious insiders or state-sponsored actors. The absence of known exploits reduces immediate risk, but the medium severity score indicates a need for timely mitigation to prevent future exploitation. The impact is more pronounced in regions with high Samsung device penetration and advanced mobile network deployments.

Mitigation Recommendations

To mitigate CVE-2024-28067, organizations and users should: 1) Monitor network traffic for signs of security mode downgrade attempts or unusual plaintext message transmissions, using advanced network intrusion detection systems capable of analyzing modem communication protocols. 2) Restrict network access to trusted devices and implement strong network segmentation to reduce the risk of MITM attacks from within the network. 3) Apply any firmware or software updates provided by Samsung or device manufacturers promptly once patches become available. 4) Employ additional end-to-end encryption at the application layer to protect message confidentiality and integrity beyond the modem's security mechanisms. 5) Educate users about the risks of connecting to untrusted or public Wi-Fi networks, which can facilitate MITM attacks. 6) Collaborate with mobile network operators to ensure secure network configurations and rapid incident response capabilities. 7) Conduct regular security assessments of mobile device fleets to identify vulnerable hardware and plan for phased upgrades or replacements if necessary. These measures go beyond generic advice by focusing on network-level detection, layered encryption, and proactive device management specific to modem vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-01T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d89b7ef31ef0b587f98

Added to database: 2/25/2026, 9:45:45 PM

Last enriched: 2/28/2026, 10:16:32 AM

Last updated: 4/12/2026, 3:40:49 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses