CVE-2024-45184: n/a
An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modems with chipset Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, Modem 5123, and Modem 5300. A USAT out-of-bounds write due to a heap buffer overflow can lead to a Denial of Service.
AI Analysis
Technical Summary
CVE-2024-45184 is a heap buffer overflow vulnerability identified in the USAT component of several Samsung Exynos chipsets, including models 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, and modems 5123 and 5300. The flaw arises from an out-of-bounds write operation on the heap, which can corrupt memory and cause the affected system to crash or become unresponsive, resulting in a denial of service. The vulnerability is exploitable locally without requiring privileges or user interaction, indicating that an attacker with local access to the device could trigger the condition. The USAT interface is part of the SIM toolkit functionality, which interacts with the SIM card to provide network services. The vulnerability is classified under CWE-120 (Classic Buffer Overflow). The CVSS v3.1 base score is 6.2, reflecting medium severity, with attack vector local, low attack complexity, no privileges required, no user interaction, and impact limited to availability. No patches or known exploits are currently available, but the broad range of affected chipsets means many Samsung devices could be vulnerable. This vulnerability could be leveraged by attackers to disrupt device operation, potentially impacting mobile communications and wearable device functionality.
Potential Impact
The primary impact of CVE-2024-45184 is denial of service, which can cause affected Samsung devices to crash or become unresponsive. This disruption affects availability but does not compromise confidentiality or integrity. For organizations, this could lead to temporary loss of mobile communication capabilities, especially in environments relying heavily on Samsung mobile and wearable devices. Critical operations that depend on continuous connectivity or device availability could be interrupted. In consumer contexts, users may experience device instability or forced reboots. Since exploitation requires local access, remote attacks are less likely, but physical access or malware with local execution capabilities could trigger the vulnerability. The lack of known exploits reduces immediate risk, but the widespread use of affected chipsets means the vulnerability could be targeted in the future. The absence of patches increases the window of exposure, emphasizing the need for proactive mitigation.
Mitigation Recommendations
Organizations and users should monitor Samsung's official security advisories and firmware updates for patches addressing CVE-2024-45184 and apply them promptly once available. Until patches are released, restrict physical and local access to devices, especially in sensitive environments. Employ endpoint protection solutions capable of detecting suspicious local activities that might attempt to exploit local vulnerabilities. For enterprise deployments, consider device management policies that limit installation of untrusted applications and enforce strong access controls. Network segmentation can help isolate critical devices to reduce risk from compromised endpoints. Regularly audit device firmware versions and configurations to identify vulnerable devices. Educate users about the risks of granting local access to unknown parties or installing untrusted software. In environments where device availability is critical, prepare contingency plans for rapid device replacement or recovery in case of denial of service incidents.
Affected Countries
United States, South Korea, India, Germany, United Kingdom, France, Brazil, Japan, China, Russia, Canada, Australia, Italy, Spain
CVE-2024-45184: n/a
Description
An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modems with chipset Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, Modem 5123, and Modem 5300. A USAT out-of-bounds write due to a heap buffer overflow can lead to a Denial of Service.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-45184 is a heap buffer overflow vulnerability identified in the USAT component of several Samsung Exynos chipsets, including models 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, and modems 5123 and 5300. The flaw arises from an out-of-bounds write operation on the heap, which can corrupt memory and cause the affected system to crash or become unresponsive, resulting in a denial of service. The vulnerability is exploitable locally without requiring privileges or user interaction, indicating that an attacker with local access to the device could trigger the condition. The USAT interface is part of the SIM toolkit functionality, which interacts with the SIM card to provide network services. The vulnerability is classified under CWE-120 (Classic Buffer Overflow). The CVSS v3.1 base score is 6.2, reflecting medium severity, with attack vector local, low attack complexity, no privileges required, no user interaction, and impact limited to availability. No patches or known exploits are currently available, but the broad range of affected chipsets means many Samsung devices could be vulnerable. This vulnerability could be leveraged by attackers to disrupt device operation, potentially impacting mobile communications and wearable device functionality.
Potential Impact
The primary impact of CVE-2024-45184 is denial of service, which can cause affected Samsung devices to crash or become unresponsive. This disruption affects availability but does not compromise confidentiality or integrity. For organizations, this could lead to temporary loss of mobile communication capabilities, especially in environments relying heavily on Samsung mobile and wearable devices. Critical operations that depend on continuous connectivity or device availability could be interrupted. In consumer contexts, users may experience device instability or forced reboots. Since exploitation requires local access, remote attacks are less likely, but physical access or malware with local execution capabilities could trigger the vulnerability. The lack of known exploits reduces immediate risk, but the widespread use of affected chipsets means the vulnerability could be targeted in the future. The absence of patches increases the window of exposure, emphasizing the need for proactive mitigation.
Mitigation Recommendations
Organizations and users should monitor Samsung's official security advisories and firmware updates for patches addressing CVE-2024-45184 and apply them promptly once available. Until patches are released, restrict physical and local access to devices, especially in sensitive environments. Employ endpoint protection solutions capable of detecting suspicious local activities that might attempt to exploit local vulnerabilities. For enterprise deployments, consider device management policies that limit installation of untrusted applications and enforce strong access controls. Network segmentation can help isolate critical devices to reduce risk from compromised endpoints. Regularly audit device firmware versions and configurations to identify vulnerable devices. Educate users about the risks of granting local access to unknown parties or installing untrusted software. In environments where device availability is critical, prepare contingency plans for rapid device replacement or recovery in case of denial of service incidents.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-08-22T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6ceab7ef31ef0b56a2ad
Added to database: 2/25/2026, 9:43:06 PM
Last enriched: 2/28/2026, 6:54:14 AM
Last updated: 4/12/2026, 5:06:39 PM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.