CVE-2024-27360

6.0 MEDIUM

📋 TL;DR

A length validation vulnerability in multiple Samsung Exynos mobile processors allows attackers to trigger denial of service conditions. This affects devices using the listed Exynos chipsets, primarily Samsung smartphones and wearables. The vulnerability stems from improper data length checking in the processor firmware.

💻 Affected Systems

Products:
  • Samsung Mobile Processors Exynos 850
  • Exynos 1080
  • Exynos 2100
  • Exynos 2200
  • Exynos 1280
  • Exynos 1380
  • Exynos 1330
  • Exynos W930
Versions: All firmware versions prior to security patches
Operating Systems: Android-based systems using affected chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices using these processors, primarily Samsung smartphones and wearables. The vulnerability is in the processor firmware itself.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device crash requiring physical reboot, potentially causing service disruption for critical mobile applications.

🟠

Likely Case

Temporary device instability or application crashes affecting user experience.

🟢

If Mitigated

Minimal impact with proper patch deployment and network segmentation.

🌐 Internet-Facing: MEDIUM - Requires local access or malicious app installation, but could be exploited via network vectors in specific scenarios.
🏢 Internal Only: MEDIUM - Internal devices could be affected if malicious apps are installed or through lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation likely requires local access or malicious app installation. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Device-specific firmware updates from Samsung

Vendor Advisory: https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-27360/

Restart Required: Yes

Instructions:

1. Check for device firmware updates in Settings > Software Update. 2. Install available security updates. 3. Reboot device after installation.

🔧 Temporary Workarounds

Application Whitelisting

all

Restrict installation of untrusted applications to prevent potential exploitation vectors.

Network Segmentation

all

Isolate affected devices from untrusted networks to reduce attack surface.

🧯 If You Can't Patch

  • Isolate affected devices on separate network segments
  • Implement strict application control policies to prevent untrusted app installation

🔍 How to Verify

Check if Vulnerable:

Check device model and processor information in Settings > About Phone. Compare with affected processor list.

Check Version:

Not applicable - check via device settings interface

Verify Fix Applied:

Verify security patch level in Settings > About Phone > Software Information. Ensure latest security updates are installed.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device reboots
  • Kernel panic logs
  • Processor exception errors

Network Indicators:

  • Unusual outbound connections from mobile devices
  • Anomalous traffic patterns from affected devices

SIEM Query:

Device logs showing repeated crash events or kernel panics on Samsung devices with Exynos processors

🔗 References

📤 Share & Export