CVE-2024-27378

6.0 MEDIUM

📋 TL;DR

A heap over-read vulnerability exists in Samsung Exynos mobile processors due to missing input validation in the slsi_send_action_frame_cert() function. This allows attackers with local access to potentially read sensitive memory contents from affected devices. The vulnerability affects Samsung smartphones and tablets using Exynos 980, 850, 1280, 1380, and 1330 processors.

💻 Affected Systems

Products:
  • Samsung smartphones and tablets with Exynos 980, Exynos 850, Exynos 1280, Exynos 1380, Exynos 1330 processors
Versions: All versions prior to security patches
Operating Systems: Android with Samsung Exynos kernel drivers
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices using the vulnerable Wi-Fi driver functions. Requires local access to trigger the vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Information disclosure of sensitive kernel memory contents, potentially including cryptographic keys, passwords, or other protected data, leading to complete device compromise.

🟠

Likely Case

Limited information disclosure of adjacent heap memory, potentially exposing some kernel data structures or application information.

🟢

If Mitigated

No impact if proper input validation is implemented or if the vulnerable function is not accessible to attackers.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring access to the device's Wi-Fi subsystem.
🏢 Internal Only: MEDIUM - Malicious apps or users with local access could exploit this vulnerability to read kernel memory.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of heap layout. No public exploits are currently known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Samsung security updates for specific device models

Vendor Advisory: https://semiconductor.samsung.com/support/quality-support/product-security-updates/

Restart Required: Yes

Instructions:

1. Check for Samsung security updates in device settings. 2. Install the latest security patch. 3. Reboot the device after installation.

🔧 Temporary Workarounds

Disable vulnerable Wi-Fi functions

android

Restrict access to Wi-Fi certification/testing functions that trigger the vulnerable code path

🧯 If You Can't Patch

  • Restrict physical access to devices and monitor for suspicious local activity
  • Implement application sandboxing and privilege separation to limit impact

🔍 How to Verify

Check if Vulnerable:

Check device model and processor type in Settings > About phone, then verify if it uses affected Exynos chips

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Check Android security patch level in Settings > About phone > Software information and ensure it's after the vulnerability disclosure date

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • Wi-Fi driver crash reports
  • Memory access violation logs

Network Indicators:

  • Unusual Wi-Fi certification frame activity

SIEM Query:

Search for kernel logs containing 'slsi_send_action_frame_cert' or Wi-Fi driver crash events

🔗 References

📤 Share & Export