Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28068: n/a

0
Medium
VulnerabilityCVE-2024-28068cvecve-2024-28068
Published: Tue Jul 09 2024 (07/09/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A vulnerability was discovered in SS in Samsung Mobile Processor, Wearable Processor, and Modems with versions Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 2400, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, and Exynos Modem 5300 that involves a NULL pointer dereference which can cause abnormal termination of a mobile phone via a manipulated packet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 10:16:50 UTC

Technical Analysis

CVE-2024-28068 is a vulnerability identified in the Samsung Exynos family of processors, including models such as Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 2200, 1280, 1380, 1330, 2400, 9110, W920, W930, and modems 5123 and 5300. The flaw is a NULL pointer dereference (CWE-476) that occurs when the system processes a specially crafted network packet. This dereference leads to abnormal termination or crashing of the device, effectively causing a denial of service (DoS). The vulnerability can be exploited remotely over the network without requiring user interaction or privileges, but the attack complexity is high, meaning it is not trivial to exploit. The CVSS 3.1 base score is 5.3, reflecting medium severity, with the vector indicating attack complexity is high, attack vector is adjacent network, and the impact is availability high but no confidentiality or integrity impact. The flaw affects a broad range of Samsung mobile and wearable processors, which are embedded in many Samsung smartphones and IoT devices worldwide. No public exploits or patches are currently available, but the risk lies in potential disruption of device availability, which could affect user experience and critical communications. The vulnerability highlights the importance of robust input validation and error handling in low-level firmware components of mobile processors.

Potential Impact

The primary impact of CVE-2024-28068 is denial of service through device crashes caused by processing maliciously crafted packets. This can disrupt mobile phone and wearable device availability, potentially affecting communication capabilities for individuals and organizations. For enterprises relying on Samsung devices for critical operations, repeated crashes could lead to productivity loss, interrupted communications, and increased support costs. In IoT or wearable contexts, device instability could impair health monitoring or other essential functions. Although the vulnerability does not compromise data confidentiality or integrity, the loss of availability can have cascading effects, especially in environments where continuous connectivity is vital. The high attack complexity reduces the likelihood of widespread exploitation, but targeted attacks against high-value users or networks remain a concern. The absence of known exploits in the wild currently limits immediate risk, but the broad device footprint means a large population is potentially vulnerable once exploit techniques mature or patches are delayed.

Mitigation Recommendations

Organizations and users should monitor official Samsung security advisories and firmware updates addressing this vulnerability and apply patches promptly once released. Until patches are available, network-level mitigations can reduce exposure by filtering or blocking suspicious packets that could trigger the NULL pointer dereference, particularly on adjacent network segments such as Wi-Fi or cellular interfaces. Employing intrusion detection/prevention systems (IDS/IPS) with updated signatures may help detect anomalous traffic patterns. Device administrators should enforce strict network segmentation and limit exposure of vulnerable devices to untrusted networks. For enterprise deployments, consider deploying endpoint protection solutions capable of monitoring device stability and alerting on abnormal terminations. Additionally, educating users about the importance of installing updates and avoiding untrusted networks can reduce risk. Samsung device manufacturers and chipset developers should review and improve input validation and error handling in firmware to prevent similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-01T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d89b7ef31ef0b587f9c

Added to database: 2/25/2026, 9:45:45 PM

Last enriched: 2/28/2026, 10:16:50 AM

Last updated: 4/12/2026, 5:07:43 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses