Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49494: n/a

0
High
VulnerabilityCVE-2025-49494cvecve-2025-49494
Published: Tue Nov 04 2025 (11/04/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 2100, 1280, 2200, 1330, 1380, 1480, 9110, Modem 5123. Mishandling of an 5G NRMM packet leads to a Denial of Service.

AI-Powered Analysis

AILast updated: 11/11/2025, 20:57:28 UTC

Technical Analysis

CVE-2025-49494 is a vulnerability identified in several Samsung Exynos processors, including Mobile Processor, Wearable Processor, and Modem variants such as Exynos 2100, 1280, 2200, 1330, 1380, 1480, 9110, and Modem 5123. The root cause is the mishandling of 5G NRMM (New Radio Mobility Management) packets, which are part of the 5G network protocol stack responsible for managing mobility and connection states. Improper processing of these packets can lead to resource exhaustion or system instability, resulting in a denial of service (DoS) condition. The vulnerability can be triggered remotely over the network without requiring any privileges or user interaction, making it highly accessible to attackers. The CVSS v3.1 score is 7.5 (high), reflecting the network attack vector, low complexity, no privileges required, and no user interaction needed, with impact limited to availability. The vulnerability is categorized under CWE-400, indicating a resource exhaustion or DoS issue. No patches or exploit code are currently available, but the affected processors are embedded in a wide range of Samsung devices, including smartphones and wearables, which are prevalent globally. The flaw could be exploited by sending specially crafted 5G NRMM packets to vulnerable devices, causing them to crash or become unresponsive, disrupting communications and services dependent on these devices.

Potential Impact

For European organizations, the impact of CVE-2025-49494 can be significant, especially those relying heavily on Samsung mobile devices and wearables for business operations, communications, or critical infrastructure monitoring. A successful DoS attack could disrupt employee communications, delay critical alerts, and degrade operational efficiency. Telecommunications providers using affected modems might experience network instability or customer service interruptions. The vulnerability could also affect IoT deployments and wearable health devices used in healthcare, potentially impacting patient monitoring and safety. Although the vulnerability does not compromise data confidentiality or integrity, the loss of availability can have cascading effects on business continuity and emergency response. Given the remote exploitability and lack of required authentication, attackers could launch widespread DoS campaigns targeting vulnerable devices across European networks, amplifying the risk to enterprises and consumers alike.

Mitigation Recommendations

Organizations should immediately inventory their device fleets to identify Samsung devices using the affected Exynos processors. Network administrators should implement filtering or monitoring of unusual 5G NRMM packet traffic to detect and block potential exploit attempts. Deploying network segmentation and isolating critical systems from direct 5G exposure can reduce attack surfaces. Users should be advised to update device firmware and operating systems promptly once Samsung releases patches addressing this vulnerability. Until patches are available, consider restricting device connectivity to trusted 5G networks or fallback to LTE where feasible. Security teams should collaborate with mobile carriers to monitor for anomalous 5G signaling traffic indicative of exploitation attempts. Additionally, incident response plans should be updated to include scenarios involving mobile device DoS to ensure rapid recovery. Continuous threat intelligence monitoring is essential to detect emerging exploits or proof-of-concept code.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-06-06T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690a5fc6a730e5a3d9e580e8

Added to database: 11/4/2025, 8:19:18 PM

Last enriched: 11/11/2025, 8:57:28 PM

Last updated: 12/20/2025, 4:00:16 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats