CVE-2024-29153: n/a
A vulnerability was discovered in Samsung Mobile Processor, Wearable Processor, and Modems with versions Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, and Exynos Modem 5300 that involves incorrect authorization of LTE NAS messages and leads to downgrading to lower network generations and repeated DDOS.
AI Analysis
Technical Summary
CVE-2024-29153 is a vulnerability identified in a broad range of Samsung Exynos processors and modems, including models such as Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 2200, 1280, 1380, 1330, 9110, W920, W930, and modems 5123 and 5300. The flaw stems from incorrect authorization handling of LTE Non-Access Stratum (NAS) messages, which are critical for signaling and control between the mobile device and the cellular network. Improper validation allows an attacker to manipulate these messages to force the device to downgrade its network connection from LTE or 5G to lower generations such as 3G or 2G. This downgrade can degrade service quality and expose the device to legacy network vulnerabilities. Additionally, the vulnerability enables repeated denial-of-service (DoS) attacks by overwhelming the device with unauthorized NAS messages, causing service interruptions. The CVSS v3.1 score of 8.1 reflects high impact on availability, confidentiality, and integrity, with no privileges or user interaction required, but with high attack complexity. The underlying weakness is categorized under CWE-400 (Uncontrolled Resource Consumption), indicating that the device's resources can be exhausted by malicious NAS message floods. Although no exploits are currently known in the wild, the wide deployment of affected Exynos chips in Samsung mobile phones and wearables makes this a significant threat. The absence of published patches necessitates proactive defense measures. This vulnerability underscores the importance of robust authorization checks in cellular protocol implementations to prevent network downgrades and DoS conditions that can disrupt mobile communications.
Potential Impact
The impact of CVE-2024-29153 is substantial for organizations and individuals relying on Samsung Exynos-based mobile and wearable devices. Exploitation can lead to forced network downgrades, reducing data throughput and exposing devices to older, less secure network protocols, increasing the risk of interception or further attacks. The repeated denial-of-service capability can disrupt critical communications, affecting business operations, emergency services, and user productivity. For enterprises with mobile workforces or IoT deployments using affected processors, this vulnerability can cause widespread connectivity issues and potential data confidentiality breaches. Telecom operators may face increased support costs and network instability if large numbers of devices are targeted. The vulnerability's ease of exploitation without user interaction or privileges raises the risk of automated or remote attacks. Given the global distribution of Samsung devices, the threat has a broad scope, potentially impacting millions of users and numerous industries worldwide.
Mitigation Recommendations
To mitigate CVE-2024-29153, organizations should implement network-level filtering and anomaly detection to identify and block unauthorized or malformed LTE NAS messages targeting devices with affected Exynos processors. Mobile device management (MDM) solutions can be used to monitor device connectivity and alert on unexpected network downgrades or service interruptions. Users and administrators should stay informed about official Samsung security advisories and apply firmware or software updates promptly once patches become available. Telecom operators should enhance their network signaling security, including validating NAS message sources and integrity, to prevent exploitation. Deploying intrusion prevention systems (IPS) capable of detecting NAS message abuse can reduce attack surface. For critical deployments, consider using devices with unaffected processors or additional security layers until patches are released. Collaboration between device manufacturers, network providers, and security teams is essential to develop comprehensive defenses against this vulnerability.
Affected Countries
United States, South Korea, India, Germany, United Kingdom, France, Brazil, Japan, China, Australia, Canada, Russia, Italy, Spain
CVE-2024-29153: n/a
Description
A vulnerability was discovered in Samsung Mobile Processor, Wearable Processor, and Modems with versions Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, and Exynos Modem 5300 that involves incorrect authorization of LTE NAS messages and leads to downgrading to lower network generations and repeated DDOS.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-29153 is a vulnerability identified in a broad range of Samsung Exynos processors and modems, including models such as Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 2200, 1280, 1380, 1330, 9110, W920, W930, and modems 5123 and 5300. The flaw stems from incorrect authorization handling of LTE Non-Access Stratum (NAS) messages, which are critical for signaling and control between the mobile device and the cellular network. Improper validation allows an attacker to manipulate these messages to force the device to downgrade its network connection from LTE or 5G to lower generations such as 3G or 2G. This downgrade can degrade service quality and expose the device to legacy network vulnerabilities. Additionally, the vulnerability enables repeated denial-of-service (DoS) attacks by overwhelming the device with unauthorized NAS messages, causing service interruptions. The CVSS v3.1 score of 8.1 reflects high impact on availability, confidentiality, and integrity, with no privileges or user interaction required, but with high attack complexity. The underlying weakness is categorized under CWE-400 (Uncontrolled Resource Consumption), indicating that the device's resources can be exhausted by malicious NAS message floods. Although no exploits are currently known in the wild, the wide deployment of affected Exynos chips in Samsung mobile phones and wearables makes this a significant threat. The absence of published patches necessitates proactive defense measures. This vulnerability underscores the importance of robust authorization checks in cellular protocol implementations to prevent network downgrades and DoS conditions that can disrupt mobile communications.
Potential Impact
The impact of CVE-2024-29153 is substantial for organizations and individuals relying on Samsung Exynos-based mobile and wearable devices. Exploitation can lead to forced network downgrades, reducing data throughput and exposing devices to older, less secure network protocols, increasing the risk of interception or further attacks. The repeated denial-of-service capability can disrupt critical communications, affecting business operations, emergency services, and user productivity. For enterprises with mobile workforces or IoT deployments using affected processors, this vulnerability can cause widespread connectivity issues and potential data confidentiality breaches. Telecom operators may face increased support costs and network instability if large numbers of devices are targeted. The vulnerability's ease of exploitation without user interaction or privileges raises the risk of automated or remote attacks. Given the global distribution of Samsung devices, the threat has a broad scope, potentially impacting millions of users and numerous industries worldwide.
Mitigation Recommendations
To mitigate CVE-2024-29153, organizations should implement network-level filtering and anomaly detection to identify and block unauthorized or malformed LTE NAS messages targeting devices with affected Exynos processors. Mobile device management (MDM) solutions can be used to monitor device connectivity and alert on unexpected network downgrades or service interruptions. Users and administrators should stay informed about official Samsung security advisories and apply firmware or software updates promptly once patches become available. Telecom operators should enhance their network signaling security, including validating NAS message sources and integrity, to prevent exploitation. Deploying intrusion prevention systems (IPS) capable of detecting NAS message abuse can reduce attack surface. For critical deployments, consider using devices with unaffected processors or additional security layers until patches are released. Collaboration between device manufacturers, network providers, and security teams is essential to develop comprehensive defenses against this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-03-18T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d9bb7ef31ef0b58939d
Added to database: 2/25/2026, 9:46:03 PM
Last enriched: 2/26/2026, 5:27:20 PM
Last updated: 4/12/2026, 3:36:12 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.