Skip to main content

CVE-2025-47202: n/a

Critical
VulnerabilityCVE-2025-47202cvecve-2025-47202
Published: Mon Jul 07 2025 (07/07/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

In RRC in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400, the lack of a length check leads to out-of-bounds writes.

AI-Powered Analysis

AILast updated: 07/14/2025, 21:16:04 UTC

Technical Analysis

CVE-2025-47202 is a critical vulnerability identified in the Radio Resource Control (RRC) component of various Samsung Exynos processors, including mobile processors, wearable processors, and modems such as Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 9110, W920, W930, W1000, and modem variants 5123, 5300, and 5400. The vulnerability arises due to a lack of proper length checking in the RRC implementation, which leads to out-of-bounds write operations (CWE-787). This type of memory corruption can cause serious security issues including denial of service or potentially arbitrary code execution. The vulnerability has a CVSS v3.1 base score of 9.1, indicating a critical severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H) shows that the attack can be performed remotely over the network without any privileges or user interaction, affecting confidentiality and availability severely but not integrity. The out-of-bounds write could allow an attacker to overwrite sensitive memory regions, leading to leakage of confidential information or crashing the device, causing denial of service. Although no known exploits are reported in the wild yet, the ease of exploitation and the critical impact make it a high-risk vulnerability. The affected processors are widely used in Samsung mobile devices and wearables, which are prevalent in consumer and enterprise environments globally. The lack of patch links suggests that fixes may still be pending or not publicly disclosed at the time of this report.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially for enterprises relying on Samsung mobile devices and wearables for communication and operational purposes. The ability to remotely exploit this vulnerability without user interaction or privileges means attackers could compromise devices silently, potentially exfiltrating sensitive corporate data or disrupting critical communications. The impact on confidentiality is high, as attackers could access sensitive information stored or processed on the device. The availability impact is also high, as successful exploitation could cause device crashes or reboots, disrupting business operations. This is particularly concerning for sectors such as finance, healthcare, and government agencies where secure and reliable mobile communications are essential. Additionally, the vulnerability could be leveraged as a foothold for lateral movement within corporate networks if devices are connected to internal resources. The absence of known exploits currently provides a window for proactive mitigation, but the critical CVSS score indicates that rapid response is necessary to prevent future attacks.

Mitigation Recommendations

European organizations should immediately inventory and identify all Samsung devices using the affected Exynos processors. Until official patches are released, organizations should enforce strict network-level protections such as isolating vulnerable devices on segmented networks and applying firewall rules to restrict unnecessary inbound traffic to mobile devices. Mobile device management (MDM) solutions should be used to monitor device health and enforce security policies, including disabling unnecessary radio interfaces if possible. Users should be educated to avoid connecting to untrusted networks and to report any unusual device behavior. Organizations should maintain close communication with Samsung for timely updates and patches. Once patches are available, rapid deployment is critical. Additionally, implementing endpoint detection and response (EDR) tools capable of monitoring anomalous behavior on mobile devices can help detect exploitation attempts. For high-risk environments, consider temporary use of alternative devices or platforms until the vulnerability is mitigated.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-05-02T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 686bf1406f40f0eb72ea5fe4

Added to database: 7/7/2025, 4:09:36 PM

Last enriched: 7/14/2025, 9:16:04 PM

Last updated: 8/16/2025, 1:19:37 AM

Views: 30

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats