Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58342: n/a

0
Medium
VulnerabilityCVE-2025-58342cvecve-2025-58342
Published: Tue Feb 03 2026 (02/03/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor and Wearable Processor Exynos 980, 850, 1080, 1280, 1330, 1380, 1480, 1580, W920, W930 and W1000. There is unbounded memory allocation via a large buffer in a /proc/driver/unifi0/uapsd write operation, leading to kernel memory exhaustion.

AI-Powered Analysis

AILast updated: 02/04/2026, 08:07:06 UTC

Technical Analysis

CVE-2025-58342 is a kernel-level vulnerability found in the Wi-Fi driver of several Samsung Exynos processors, including models 980, 850, 1080, 1280, 2200, 1330, 1380, 1480, 1580, and wearable processors W920, W930, and W1000. The flaw arises from an unbounded memory allocation triggered by writing a large buffer to the /proc/driver/unifi0/uapsd interface. This procfs interface is used for configuring Unscheduled Automatic Power Save Delivery (U-APSD) parameters related to Wi-Fi power management. Because the driver does not properly limit the size of the input buffer, an attacker can cause excessive kernel memory allocation, leading to exhaustion of kernel memory resources. This can result in denial of service (DoS) conditions such as system crashes, freezes, or reboots. The vulnerability is local in nature, as it requires writing to a procfs file, which typically requires local access or elevated privileges. However, if an attacker can execute code or commands on the device, they could exploit this vulnerability to disrupt device availability. The vulnerability affects a broad range of Samsung devices using these Exynos processors, which are common in Samsung smartphones and wearables. No patches or exploit code are currently publicly available, and no known exploits in the wild have been reported. The lack of a CVSS score means severity must be assessed based on the impact and exploitability characteristics. The vulnerability impacts kernel memory integrity and availability but does not directly expose confidentiality risks. The scope is limited to devices with the affected processors and Wi-Fi drivers. Exploitation does not require user interaction beyond the ability to write to the procfs interface. Overall, this vulnerability represents a significant risk of denial of service on affected Samsung devices.

Potential Impact

For European organizations, the primary impact of CVE-2025-58342 is the potential for denial of service on Samsung mobile and wearable devices that use the affected Exynos processors. This could disrupt business operations, especially for organizations relying on mobile connectivity for critical communications, remote work, or IoT device management. The kernel memory exhaustion could cause device crashes or instability, leading to loss of productivity and increased support costs. In sectors such as healthcare, finance, and public services where Samsung devices are prevalent, this could affect service availability and user trust. Additionally, if attackers gain local access to devices, they could leverage this vulnerability to cause targeted disruptions. Although no data breach or privilege escalation is directly indicated, the denial of service impact on endpoint devices can indirectly affect confidentiality and integrity by interrupting security monitoring or patch management processes. The lack of known exploits reduces immediate risk, but the widespread use of affected devices in Europe means the threat could escalate if exploit code emerges.

Mitigation Recommendations

1. Samsung should prioritize developing and releasing security patches for the affected Wi-Fi drivers in the Exynos processors. Organizations should monitor Samsung security advisories and apply updates as soon as they become available. 2. Restrict access to the /proc/driver/unifi0/uapsd interface by enforcing strict permissions and limiting write access only to trusted system components or administrators. 3. Employ endpoint protection solutions that monitor for abnormal kernel memory usage or unusual writes to procfs interfaces to detect potential exploitation attempts. 4. For organizations managing fleets of Samsung devices, implement mobile device management (MDM) policies that enforce timely patching and restrict installation of untrusted applications that could attempt local exploitation. 5. Conduct regular security audits and vulnerability assessments on mobile and wearable devices to identify outdated firmware or drivers. 6. Educate users and administrators about the risks of local privilege escalation and denial of service vulnerabilities, emphasizing the importance of device hygiene and cautious handling of device interfaces. 7. Consider network segmentation and limiting device exposure to untrusted networks to reduce the risk of attackers gaining local access required for exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-29T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6982fcd2f9fa50a62f76629a

Added to database: 2/4/2026, 8:01:22 AM

Last enriched: 2/4/2026, 8:07:06 AM

Last updated: 2/5/2026, 8:25:00 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats