CVE-2024-28067

5.3 MEDIUM

📋 TL;DR

This vulnerability in Samsung Exynos Modem 5300 allows a Man-in-the-Middle attacker to downgrade the security mode of packets, enabling the attacker to send plaintext messages to the victim. This affects devices using the vulnerable modem chipset, primarily Samsung mobile devices and potentially other manufacturers' devices incorporating this modem.

💻 Affected Systems

Products:
  • Samsung Exynos Modem 5300
Versions: All versions prior to patch
Operating Systems: Android-based systems using affected modem
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with Exynos Modem 5300 chipset; exact device models not specified in available references.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could intercept and manipulate sensitive communications, potentially leading to data theft, credential compromise, or injection of malicious content into device communications.

🟠

Likely Case

Selective plaintext message injection or downgrade attacks in controlled MITM scenarios, potentially compromising specific application data.

🟢

If Mitigated

Limited impact if strong application-layer encryption is used and network-level protections prevent MITM positioning.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires MITM positioning and knowledge of the vulnerability; no public exploit code identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in references; check Samsung security updates

Vendor Advisory: https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-28067/

Restart Required: Yes

Instructions:

1. Check for Samsung security updates
2. Apply available modem firmware updates
3. Reboot device after update

🔧 Temporary Workarounds

Use application-layer encryption

all

Implement end-to-end encryption in applications to protect data even if modem security is compromised

Avoid untrusted networks

all

Prevent MITM attacks by using trusted, secure networks only

🧯 If You Can't Patch

  • Isolate affected devices from untrusted networks
  • Monitor for unusual network traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check device specifications for Exynos Modem 5300 and review Samsung security update status

Check Version:

Device-specific; typically in Settings > About Phone > Software Information

Verify Fix Applied:

Verify latest Samsung security updates are installed and check modem firmware version if accessible

📡 Detection & Monitoring

Log Indicators:

  • Unexpected protocol downgrades in modem logs
  • Unusual plaintext communication patterns

Network Indicators:

  • MITM activity detection
  • Protocol anomalies in cellular communications

SIEM Query:

Not applicable for typical SIEM deployment; requires modem-level monitoring

🔗 References

📤 Share & Export