Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39890: n/a

0
High
VulnerabilityCVE-2024-39890cvecve-2024-39890
Published: Mon Dec 02 2024 (12/02/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, W1000, Modem 5123, Modem 5300. The baseband software does not properly check the length specified by the CC (Call Control). This can lead to an Out-of-Bounds write.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 05:57:41 UTC

Technical Analysis

CVE-2024-39890 is a vulnerability identified in the baseband software of various Samsung Exynos processors, including models 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, W1000, and modems 5123 and 5300. The root cause is an improper validation of the length field specified by the Call Control (CC) protocol within the baseband software. This flaw allows an attacker to trigger an out-of-bounds write, a type of memory corruption where data is written outside the intended buffer boundaries. Such memory corruption can lead to arbitrary code execution, denial of service, or escalation of privileges within the baseband processor environment. The vulnerability has a CVSS v3.1 score of 8.1, indicating high severity, with attack vector being network-based but requiring high complexity and no privileges or user interaction. The scope is unchanged, meaning the impact is limited to the vulnerable component but with high confidentiality, integrity, and availability impacts. The baseband processor is critical as it handles cellular communications, so exploitation could compromise device communications and security at a fundamental level. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. This vulnerability is categorized under CWE-787, highlighting it as an out-of-bounds write issue, a common and dangerous memory safety flaw.

Potential Impact

The impact of CVE-2024-39890 is substantial for organizations and individuals relying on Samsung devices powered by the affected Exynos processors. Exploitation could allow remote attackers to execute arbitrary code within the baseband processor, potentially leading to full compromise of the device's cellular communication capabilities. This could result in interception or manipulation of calls and data, denial of service by crashing the baseband, or persistent device compromise. For enterprises, this could mean exposure of sensitive communications, disruption of mobile workforce connectivity, and potential lateral movement into corporate networks via compromised devices. The vulnerability affects a broad range of devices including smartphones, wearables, and modems, increasing the attack surface. Given the baseband's privileged position, traditional OS-level security controls may be bypassed, making detection and remediation more challenging. The absence of known exploits currently reduces immediate risk but the public disclosure increases the likelihood of future exploitation attempts. Organizations with high reliance on Samsung mobile and wearable devices should consider this a critical risk to their mobile security posture.

Mitigation Recommendations

1. Monitor Samsung and chipset vendor advisories closely for official patches and apply them immediately upon release. 2. Restrict network access to cellular baseband interfaces where possible, using network segmentation and firewall rules to limit exposure to untrusted networks. 3. Employ runtime protections such as memory corruption mitigations (e.g., Control Flow Integrity, Address Space Layout Randomization) at the baseband software level if supported. 4. Use mobile device management (MDM) solutions to enforce security policies and monitor device behavior for anomalies indicative of baseband compromise. 5. Educate users to avoid suspicious network environments that could be leveraged to exploit baseband vulnerabilities. 6. Collaborate with mobile carriers to detect and mitigate suspicious baseband traffic patterns. 7. Prepare incident response plans that include baseband compromise scenarios and forensic capabilities. 8. Consider temporary use of alternative devices or chipsets if critical operations depend on vulnerable devices and patches are delayed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-02T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c89b7ef31ef0b565ffa

Added to database: 2/25/2026, 9:41:29 PM

Last enriched: 2/26/2026, 5:57:41 AM

Last updated: 4/12/2026, 9:12:33 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses