Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45185: n/a

0
Medium
VulnerabilityCVE-2024-45185cvecve-2024-45185
Published: Mon Nov 04 2024 (11/04/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, Modem 5123, Modem 5300. There is an out-of-bounds write due to a heap overflow in the GPRS protocol.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 06:54:31 UTC

Technical Analysis

CVE-2024-45185 is a vulnerability discovered in a broad range of Samsung Exynos processors, including mobile processors (9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400), wearable processors (9110, W920, W930), and modems (5123, 5300). The issue stems from an out-of-bounds write caused by a heap overflow in the implementation of the GPRS protocol within these chips. This vulnerability is classified under CWE-787 (Out-of-bounds Write), indicating that the software writes data outside the boundaries of allocated heap memory, potentially corrupting memory and leading to unpredictable behavior. The CVSS 3.1 base score is 5.1, reflecting a medium severity level. The attack vector is local (AV:L), meaning exploitation requires local access to the device, but no privileges (PR:N) or user interaction (UI:N) are needed. The impact affects integrity and availability (I:L, A:L), potentially allowing an attacker to corrupt data or cause denial of service. The vulnerability could be exploited by an attacker with local access to the device's GPRS protocol stack, possibly leading to system instability or code execution within the affected component. No patches or known exploits are currently available, emphasizing the need for vigilance and proactive mitigation. Given the wide range of affected chipsets used in Samsung smartphones, wearables, and modems, this vulnerability has broad implications for device security.

Potential Impact

The vulnerability could allow an attacker with local access to cause out-of-bounds writes in the heap memory of the GPRS protocol stack, leading to potential corruption of memory, system crashes, or denial of service. While the CVSS score indicates no direct confidentiality impact, the integrity and availability of the affected device's communication functions could be compromised. This may disrupt cellular connectivity or cause device instability, impacting user experience and potentially critical communications. The lack of required privileges or user interaction lowers the barrier for exploitation by local attackers, such as malicious apps or compromised processes on the device. However, the local attack vector limits remote exploitation, reducing the risk of widespread remote attacks. Organizations relying on Samsung devices with these processors, especially in critical communication roles, could face operational disruptions. The absence of known exploits in the wild and patches means the window for proactive defense is still open but requires attention.

Mitigation Recommendations

1. Monitor Samsung security advisories and firmware updates closely for patches addressing CVE-2024-45185 and apply them promptly once available. 2. Limit local access to devices by enforcing strong device access controls, including secure lock screens and restricting installation of untrusted applications to reduce the risk of local exploitation. 3. Employ mobile device management (MDM) solutions to enforce security policies and monitor device behavior for anomalies indicative of exploitation attempts. 4. For organizations deploying Samsung-based IoT or wearable devices, segment these devices on separate networks to contain potential impacts. 5. Encourage users to avoid installing apps from untrusted sources that could leverage local access to exploit this vulnerability. 6. Conduct regular security audits and penetration testing focusing on local privilege escalation and memory corruption vectors on affected devices. 7. Collaborate with Samsung support channels to obtain early warnings and technical guidance on mitigation strategies. 8. Consider deploying runtime protection or memory safety tools where feasible to detect and prevent heap overflow exploitation on devices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-22T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ceab7ef31ef0b56a2b1

Added to database: 2/25/2026, 9:43:06 PM

Last enriched: 2/28/2026, 6:54:31 AM

Last updated: 4/12/2026, 3:43:07 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses