Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58347: n/a

0
Medium
VulnerabilityCVE-2025-58347cvecve-2025-58347
Published: Tue Feb 03 2026 (02/03/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor and Wearable Processor Exynos 980, 850, 1080, 1280, 1330, 1380, 1480, 1580, W920, W930 and W1000. There is unbounded memory allocation via a large buffer in a /proc/driver/unifi0/p2p_certif write operation, leading to kernel memory exhaustion.

AI-Powered Analysis

AILast updated: 02/04/2026, 08:08:32 UTC

Technical Analysis

CVE-2025-58347 is a security vulnerability identified in the Wi-Fi driver component of Samsung's Exynos series processors, specifically models 980, 850, 1080, 1280, 2200, 1330, 1380, 1480, 1580, and wearable processors W920, W930, and W1000. The vulnerability arises from an unbounded memory allocation triggered by writing a large buffer to the procfs interface at /proc/driver/unifi0/p2p_certif. This operation leads to kernel memory exhaustion, effectively causing a denial of service (DoS) condition by destabilizing or crashing the kernel. The flaw exists because the driver does not properly validate or limit the size of the input buffer before allocating memory, allowing an attacker to consume excessive kernel memory. Exploitation requires local access to the device to perform the write operation, but no authentication is needed, increasing the risk from malicious apps or local attackers. While no public exploits or patches are currently available, the vulnerability affects a broad range of Samsung devices powered by these Exynos processors, including many popular smartphones and wearables. The lack of a CVSS score suggests the vulnerability is newly disclosed and pending further analysis. The root cause is a classic resource exhaustion vulnerability in a privileged kernel driver interface, which could be leveraged to disrupt device availability or potentially facilitate further attacks if combined with other vulnerabilities.

Potential Impact

For European organizations, the impact of CVE-2025-58347 could be significant, especially those relying heavily on Samsung mobile devices and wearables for business operations. Successful exploitation can lead to denial of service on affected devices, causing unexpected reboots, crashes, or degraded performance. This can disrupt communication, mobile workforce productivity, and critical applications running on these devices. In sectors such as finance, healthcare, and government where mobile device availability and reliability are crucial, this could translate into operational downtime and potential data access issues. Although the vulnerability does not directly expose data confidentiality or integrity, the resulting device instability could be exploited as part of a larger attack chain. Additionally, the lack of authentication requirement means that malicious applications or insiders with local device access could trigger the exploit. The absence of known exploits in the wild currently reduces immediate risk, but the broad device impact and ease of triggering the condition warrant proactive mitigation.

Mitigation Recommendations

To mitigate CVE-2025-58347, organizations should: 1) Monitor Samsung and Exynos security advisories closely for official patches or firmware updates addressing this vulnerability and apply them promptly. 2) Restrict installation of untrusted or potentially malicious applications on devices, especially those that could access low-level system interfaces or procfs entries. 3) Employ mobile device management (MDM) solutions to enforce strict application whitelisting and limit local access to system files. 4) Educate users about the risks of installing unauthorized software and the importance of device security hygiene. 5) For high-security environments, consider isolating or limiting the use of vulnerable Samsung devices until patches are available. 6) Implement monitoring for unusual device crashes or reboots that may indicate exploitation attempts. 7) Collaborate with Samsung support channels to obtain early access to fixes or workarounds. These steps go beyond generic advice by focusing on controlling local access vectors and leveraging enterprise device management capabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-29T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6982fcd2f9fa50a62f7662ae

Added to database: 2/4/2026, 8:01:22 AM

Last enriched: 2/4/2026, 8:08:32 AM

Last updated: 2/7/2026, 12:18:21 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats