Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39343: n/a

0
High
VulnerabilityCVE-2024-39343cvecve-2024-39343
Published: Mon Dec 02 2024 (12/02/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Samsung Mobile Processor and Wearable Processor Exynos 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, Modem 5123, and Modem 5300. The baseband software does not properly check the length specified by the MM (Mobility Management) module, which can lead to Denial of Service.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 05:54:42 UTC

Technical Analysis

CVE-2024-39343 is a vulnerability identified in the baseband software of several Samsung Exynos processors, including models 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, and modems 5123 and 5300. The root cause is an improper length check performed by the Mobility Management (MM) module within the baseband firmware. This flaw can be triggered by specially crafted signaling messages that specify incorrect length values, leading to a Denial of Service (DoS) condition where the baseband software may crash or become unresponsive. The vulnerability is classified under CWE-1284, which relates to improper length checks. The CVSS v3.1 score is 7.0 (high severity), reflecting a high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), network attack vector (AV:N), and impacts mainly availability (A:H) with low confidentiality (C:L) and integrity (I:L) impacts. Exploitation requires network access to the cellular baseband interface, which is typically isolated from the main operating system but can be accessed remotely via cellular networks. No known exploits have been reported in the wild as of publication. The vulnerability affects a wide range of Samsung's mobile and wearable processors, which are embedded in many smartphones, tablets, and wearable devices globally. Due to the critical role of baseband processors in cellular communication, successful exploitation can disrupt device connectivity and availability, impacting user experience and potentially critical communications. No patches or firmware updates have been publicly released yet, so mitigation currently relies on network-level protections and monitoring.

Potential Impact

The primary impact of CVE-2024-39343 is a Denial of Service condition on devices using affected Samsung Exynos processors and modems. This can cause temporary or prolonged loss of cellular connectivity, affecting voice, data, and emergency services. For individual users, this results in device unavailability and communication disruption. For organizations, especially those relying on mobile devices for critical operations or IoT deployments, this can lead to operational downtime, loss of productivity, and potential safety risks. The vulnerability's exploitation does not grant attackers access to sensitive data or allow code execution, limiting confidentiality and integrity impacts. However, the high availability impact on a broad range of devices worldwide makes it a significant threat. The lack of required privileges or user interaction increases the risk of remote exploitation, although the high attack complexity reduces the likelihood of widespread attacks. Critical sectors such as telecommunications, emergency services, and industries relying on mobile connectivity may experience service degradation or outages if targeted. The absence of known exploits in the wild currently limits immediate risk but does not preclude future exploitation attempts.

Mitigation Recommendations

1. Monitor Samsung and device vendors for official firmware or baseband software updates addressing CVE-2024-39343 and apply patches promptly once available. 2. Employ network-level protections such as filtering and anomaly detection on cellular signaling traffic to identify and block malformed MM messages that could trigger the vulnerability. 3. Coordinate with mobile network operators to implement safeguards against malicious signaling messages at the network infrastructure level. 4. For enterprise deployments, consider using mobile device management (MDM) solutions to enforce timely updates and monitor device connectivity issues. 5. Educate users and administrators about potential connectivity disruptions and establish contingency communication plans. 6. Where possible, isolate critical devices from untrusted cellular networks or use VPNs and secure communication channels to reduce exposure. 7. Conduct regular security assessments on mobile devices and IoT endpoints using affected processors to detect anomalous behavior indicative of exploitation attempts. 8. Maintain up-to-date inventories of devices with affected Exynos processors to prioritize patching and risk management efforts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-24T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c87b7ef31ef0b565e81

Added to database: 2/25/2026, 9:41:27 PM

Last enriched: 2/26/2026, 5:54:42 AM

Last updated: 4/12/2026, 7:52:56 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses