CVE-2025-58346: n/a
An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor and Wearable Processor Exynos 980, 850, 1080, 1280, 1330, 1380, 1480, 1580, W920, W930 and W1000. There is unbounded memory allocation via a large buffer in a /proc/driver/unifi0/send_addts write operation, leading to kernel memory exhaustion.
AI Analysis
Technical Summary
CVE-2025-58346 is a vulnerability identified in the Wi-Fi driver component of Samsung's Exynos series of mobile and wearable processors, including models 980, 850, 1080, 1280, 1330, 1380, 1480, 1580, W920, W930, and W1000. The issue arises from an unbounded memory allocation triggered when a large buffer is written to the /proc/driver/unifi0/send_addts interface. This operation leads to kernel memory exhaustion, effectively causing a denial of service (DoS) condition by depleting critical system resources. The vulnerability is classified under CWE-770, which relates to allocation of resources without limits or throttling. The CVSS v3.1 score is 5.5 (medium severity) with vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating local attack vector, low attack complexity, low privileges required, no user interaction, unchanged scope, no impact on confidentiality or integrity, but high impact on availability. No known exploits are currently reported in the wild, and no official patches have been released. The vulnerability primarily affects the kernel's Wi-Fi driver, which is critical for wireless communication on affected devices. Exploitation requires local access with some privileges, making it less likely to be exploited remotely but still a concern for compromised or insider threat scenarios. The lack of user interaction requirement means that once local access is obtained, exploitation can be automated. This vulnerability could be leveraged to disrupt device availability, impacting mobile and wearable devices relying on these processors.
Potential Impact
For European organizations, the primary impact of CVE-2025-58346 is the potential for denial of service on devices using affected Samsung Exynos processors. This can disrupt mobile communications, wearable device functionality, and any business processes relying on these devices. Industries such as telecommunications, healthcare (wearables for patient monitoring), and logistics (mobile device tracking) could face operational interruptions. The vulnerability does not compromise data confidentiality or integrity, but availability loss can lead to productivity degradation and service outages. Given the local access requirement, the threat is more pronounced in environments where devices are shared, or where attackers have already gained some foothold. The absence of known exploits reduces immediate risk, but the medium severity score suggests organizations should proactively address the issue to avoid potential exploitation. The impact is heightened in sectors with critical reliance on mobile and wearable technology for real-time data and communication.
Mitigation Recommendations
To mitigate CVE-2025-58346, organizations should first identify devices using the affected Samsung Exynos processors. Restrict access to the /proc/driver/unifi0/send_addts interface by enforcing strict permissions and limiting local user privileges to trusted administrators only. Implement monitoring solutions to detect unusual memory allocation patterns or spikes in kernel memory usage that could indicate exploitation attempts. Employ endpoint security tools capable of detecting anomalous local operations on device drivers. Where possible, isolate critical devices from untrusted users and networks to reduce the risk of local privilege escalation. Engage with Samsung or device vendors for firmware or driver updates addressing this vulnerability once available. Until patches are released, consider deploying host-based intrusion prevention systems (HIPS) to block suspicious writes to the vulnerable interface. Additionally, educate users about the risks of installing untrusted applications or granting unnecessary privileges that could facilitate local exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Finland
CVE-2025-58346: n/a
Description
An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor and Wearable Processor Exynos 980, 850, 1080, 1280, 1330, 1380, 1480, 1580, W920, W930 and W1000. There is unbounded memory allocation via a large buffer in a /proc/driver/unifi0/send_addts write operation, leading to kernel memory exhaustion.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-58346 is a vulnerability identified in the Wi-Fi driver component of Samsung's Exynos series of mobile and wearable processors, including models 980, 850, 1080, 1280, 1330, 1380, 1480, 1580, W920, W930, and W1000. The issue arises from an unbounded memory allocation triggered when a large buffer is written to the /proc/driver/unifi0/send_addts interface. This operation leads to kernel memory exhaustion, effectively causing a denial of service (DoS) condition by depleting critical system resources. The vulnerability is classified under CWE-770, which relates to allocation of resources without limits or throttling. The CVSS v3.1 score is 5.5 (medium severity) with vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating local attack vector, low attack complexity, low privileges required, no user interaction, unchanged scope, no impact on confidentiality or integrity, but high impact on availability. No known exploits are currently reported in the wild, and no official patches have been released. The vulnerability primarily affects the kernel's Wi-Fi driver, which is critical for wireless communication on affected devices. Exploitation requires local access with some privileges, making it less likely to be exploited remotely but still a concern for compromised or insider threat scenarios. The lack of user interaction requirement means that once local access is obtained, exploitation can be automated. This vulnerability could be leveraged to disrupt device availability, impacting mobile and wearable devices relying on these processors.
Potential Impact
For European organizations, the primary impact of CVE-2025-58346 is the potential for denial of service on devices using affected Samsung Exynos processors. This can disrupt mobile communications, wearable device functionality, and any business processes relying on these devices. Industries such as telecommunications, healthcare (wearables for patient monitoring), and logistics (mobile device tracking) could face operational interruptions. The vulnerability does not compromise data confidentiality or integrity, but availability loss can lead to productivity degradation and service outages. Given the local access requirement, the threat is more pronounced in environments where devices are shared, or where attackers have already gained some foothold. The absence of known exploits reduces immediate risk, but the medium severity score suggests organizations should proactively address the issue to avoid potential exploitation. The impact is heightened in sectors with critical reliance on mobile and wearable technology for real-time data and communication.
Mitigation Recommendations
To mitigate CVE-2025-58346, organizations should first identify devices using the affected Samsung Exynos processors. Restrict access to the /proc/driver/unifi0/send_addts interface by enforcing strict permissions and limiting local user privileges to trusted administrators only. Implement monitoring solutions to detect unusual memory allocation patterns or spikes in kernel memory usage that could indicate exploitation attempts. Employ endpoint security tools capable of detecting anomalous local operations on device drivers. Where possible, isolate critical devices from untrusted users and networks to reduce the risk of local privilege escalation. Engage with Samsung or device vendors for firmware or driver updates addressing this vulnerability once available. Until patches are released, consider deploying host-based intrusion prevention systems (HIPS) to block suspicious writes to the vulnerable interface. Additionally, educate users about the risks of installing untrusted applications or granting unnecessary privileges that could facilitate local exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-29T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6982fcd2f9fa50a62f7662aa
Added to database: 2/4/2026, 8:01:22 AM
Last enriched: 2/11/2026, 11:21:08 AM
Last updated: 3/24/2026, 1:03:13 AM
Views: 110
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.