Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58348: n/a

0
Medium
VulnerabilityCVE-2025-58348cvecve-2025-58348
Published: Tue Feb 03 2026 (02/03/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor and Wearable Processor Exynos 980, 850, 1080, 1280, 1330, 1380, 1480, 1580, W920, W930 and W1000. There is unbounded memory allocation via a large buffer in a /proc/driver/unifi0/confg_tspec write operation, leading to kernel memory exhaustion.

AI-Powered Analysis

AILast updated: 02/04/2026, 08:08:49 UTC

Technical Analysis

CVE-2025-58348 is a vulnerability discovered in the Wi-Fi driver component of Samsung's Exynos processors, specifically models 980, 850, 1080, 1280, 2200, 1330, 1380, 1480, 1580, and wearable processors W920, W930, and W1000. The flaw arises from an unbounded memory allocation triggered by writing an excessively large buffer to the /proc/driver/unifi0/confg_tspec interface. This interface is part of the proc filesystem, which allows user-space processes to interact with kernel drivers. The unbounded allocation leads to kernel memory exhaustion, which can cause the kernel to crash or become unstable, resulting in a denial of service (DoS). Since this vulnerability is in the kernel space, exploitation can severely impact device stability and availability. The vulnerability does not require authentication, but an attacker needs local access to the device to perform the write operation. No public exploits or patches are currently known or available, and no CVSS score has been assigned yet. The affected processors are widely used in Samsung smartphones and wearables, making the vulnerability relevant to a large user base. The lack of authentication requirement and the potential for kernel-level DoS make this a significant threat, especially in environments where device availability is critical.

Potential Impact

For European organizations, this vulnerability poses a risk primarily through denial of service on devices running affected Samsung Exynos processors. Organizations relying on Samsung mobile devices or wearables for critical communications, authentication, or operational tasks could experience disruptions if devices become unresponsive or crash due to kernel memory exhaustion. This could impact sectors such as healthcare, finance, and government where mobile device availability is essential. Additionally, if attackers gain local access to devices, they could exploit this vulnerability to disrupt operations or potentially use it as a foothold for further attacks. The impact on confidentiality and integrity is limited as the vulnerability primarily causes availability issues. However, operational disruptions in critical environments could have cascading effects on business continuity and security posture.

Mitigation Recommendations

Immediate mitigation involves Samsung releasing firmware or driver patches that properly validate and limit buffer sizes written to /proc/driver/unifi0/confg_tspec to prevent unbounded memory allocation. Organizations should monitor Samsung security advisories and apply updates promptly once available. Until patches are released, organizations should restrict local access to devices, enforce strict device usage policies, and consider disabling or restricting access to the vulnerable proc interface if feasible. Endpoint protection solutions should be configured to detect anomalous writes to proc filesystem entries. For high-security environments, consider using mobile device management (MDM) solutions to enforce security policies and monitor device health. Regular backups and incident response plans should be updated to address potential device outages caused by this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-29T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6982fcd2f9fa50a62f7662b2

Added to database: 2/4/2026, 8:01:22 AM

Last enriched: 2/4/2026, 8:08:49 AM

Last updated: 2/7/2026, 12:54:51 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats