Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59439: n/a

0
High
VulnerabilityCVE-2025-59439cvecve-2025-59439
Published: Tue Feb 03 2026 (02/03/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Samsung Mobile Processor, Wearable Processor and Modem Exynos 980, 990, 850, 1080, 9110, W920, W930, W1000 and Modem 5123. Incorrect handling of NAS Registration messages leads to a Denial of Service because of Improper Handling of Exceptional Conditions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 11:36:55 UTC

Technical Analysis

CVE-2025-59439 is a vulnerability discovered in several Samsung Exynos processors, including Mobile Processor, Wearable Processor, and Modem variants such as Exynos 980, 990, 850, 1080, 9110, W920, W930, W1000, and Modem 5123. The issue stems from incorrect handling of Non-Access Stratum (NAS) Registration messages, which are part of the cellular network protocol stack responsible for managing registration and mobility of devices on LTE/5G networks. Specifically, the processors improperly handle exceptional conditions triggered by malformed or unexpected NAS Registration messages, leading to a denial of service (DoS) condition. This DoS manifests as a crash or unresponsiveness of the affected processor component, resulting in loss of network connectivity or device functionality. The vulnerability does not compromise confidentiality or integrity but severely impacts availability. The CVSS v3.1 base score is 7.5, reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality or integrity impact (C:N/I:N), and high availability impact (A:H). No patches or exploits are currently publicly available, but the broad range of affected processors indicates a wide attack surface across mobile phones, wearables, and IoT devices using these chips. The root cause aligns with CWE-400 (Uncontrolled Resource Consumption), where improper input handling leads to resource exhaustion or crash. This vulnerability could be exploited remotely by sending crafted NAS Registration messages over the cellular network, potentially disrupting device operation or network services.

Potential Impact

For European organizations, the primary impact of CVE-2025-59439 is operational disruption due to denial of service on devices using affected Samsung Exynos processors. Telecommunications providers may experience increased support calls and network instability if large numbers of subscriber devices become unresponsive. Enterprises relying on mobile or wearable devices for critical communications, especially in sectors like healthcare, finance, and emergency services, could face interruptions affecting business continuity. IoT deployments in smart cities or industrial environments using these processors might suffer degraded performance or outages. Although no data breach risk exists, the loss of availability can hinder productivity and safety. The lack of required authentication and user interaction means attackers can remotely trigger the DoS, increasing the threat level. The absence of known exploits reduces immediate risk but also means organizations must proactively monitor and prepare. The impact is magnified in regions with high Samsung device market share and advanced 4G/5G infrastructure, where the vulnerability could be leveraged for targeted disruption or large-scale denial of service campaigns.

Mitigation Recommendations

Mitigation should focus on a multi-layered approach: 1) Coordinate with Samsung and device manufacturers to obtain and deploy firmware or software updates addressing the NAS message handling flaw as soon as patches become available. 2) Network operators should implement filtering and anomaly detection on NAS signaling traffic to identify and block malformed or suspicious NAS Registration messages before they reach end devices. 3) Enterprises should inventory devices using affected Exynos processors and prioritize patching or replacement for critical assets. 4) Employ network segmentation and access controls to limit exposure of vulnerable devices to untrusted networks. 5) Monitor device logs and network telemetry for signs of repeated NAS registration failures or device crashes indicative of attempted exploitation. 6) Engage with mobile carriers to understand their mitigation strategies and incident response plans related to this vulnerability. 7) Consider fallback communication methods or redundancy for critical operations relying on affected devices to maintain availability during potential disruptions. These steps go beyond generic advice by emphasizing collaboration with manufacturers and network-level defenses tailored to the cellular protocol context.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6982fcd3f9fa50a62f7662e2

Added to database: 2/4/2026, 8:01:23 AM

Last enriched: 2/11/2026, 11:36:55 AM

Last updated: 3/24/2026, 12:49:27 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses