CVE-2024-25074

5.9 MEDIUM

📋 TL;DR

A pointer dereference vulnerability in Samsung Exynos baseband software allows attackers to cause denial of service by exploiting improper pointer validation in the Session Management module. This affects numerous Samsung mobile processors and modems used in smartphones and other mobile devices. Users of affected Samsung devices are potentially vulnerable.

💻 Affected Systems

Products:
  • Samsung Semiconductor Mobile Processor Exynos 9820
  • Exynos 9825
  • Exynos 980
  • Exynos 990
  • Exynos 850
  • Exynos 1080
  • Exynos 2100
  • Exynos 2200
  • Exynos 1280
  • Exynos 1380
  • Exynos 1330
  • Exynos 9110
  • Exynos W920
  • Exynos W930
  • Exynos Modem 5123
  • Exynos Modem 5300
Versions: All versions prior to vendor patch
Operating Systems: Android, Tizen, Wear OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices using these Exynos processors/modems. Vulnerability is in baseband firmware, not application processor.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device crash or baseband processor failure requiring physical restart, potentially disrupting cellular connectivity and emergency services access.

🟠

Likely Case

Temporary loss of cellular connectivity (calls, SMS, data) until device reboots, with possible service disruption for affected users.

🟢

If Mitigated

Minimal impact if patched, with normal device operation maintained.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: HIGH

Exploitation requires baseband-level access and knowledge of SM module internals. No public exploits known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Vendor-specific firmware updates

Vendor Advisory: https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-25074/

Restart Required: Yes

Instructions:

1. Check for device manufacturer firmware updates. 2. Apply latest security patch from device vendor. 3. Reboot device after update.

🔧 Temporary Workarounds

Disable vulnerable cellular bands

android

Temporarily disable cellular connectivity to prevent exploitation via baseband.

adb shell settings put global airplane_mode_on 1
adb shell am broadcast -a android.intent.action.AIRPLANE_MODE

🧯 If You Can't Patch

  • Isolate affected devices from untrusted networks
  • Monitor for baseband crash logs and cellular service disruptions

🔍 How to Verify

Check if Vulnerable:

Check device model and processor in Settings > About phone. Compare with affected Exynos models list.

Check Version:

adb shell getprop ro.boot.bootloader

Verify Fix Applied:

Verify security patch level in Settings > About phone > Software information is after vendor patch date.

📡 Detection & Monitoring

Log Indicators:

  • Baseband crash logs
  • Unexpected cellular service disconnections
  • Modem restart events in system logs

Network Indicators:

  • Sudden loss of cellular connectivity without user action
  • Abnormal baseband signaling patterns

SIEM Query:

source="android_system" AND ("modem crash" OR "baseband failure" OR "ril restart")

🔗 References

📤 Share & Export