CVE-2024-29152

5.9 MEDIUM

📋 TL;DR

A vulnerability in Samsung Exynos baseband software allows improper state checking of RRC Reconfiguration messages, potentially leading to sensitive information disclosure. This affects Samsung mobile devices, wearables, and modems using the listed Exynos processors. Attackers could exploit this to access protected data transmitted over cellular networks.

💻 Affected Systems

Products:
  • Samsung Mobile Processor
  • Samsung Wearable Processor
  • Samsung Modem Exynos 980
  • Exynos 990
  • Exynos 1080
  • Exynos 2100
  • Exynos 2200
  • Exynos 1280
  • Exynos 1380
  • Exynos 1330
  • Exynos 2400
  • Exynos Modem 5123
  • Exynos Modem 5300
Versions: All versions prior to security patches
Operating Systems: Android-based systems using affected Exynos chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with cellular connectivity using vulnerable Exynos baseband firmware. Requires cellular network access for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of cellular communications including interception of voice calls, SMS messages, and mobile data containing sensitive personal or corporate information.

🟠

Likely Case

Limited information disclosure of cellular network metadata or partial data interception depending on network conditions and attacker proximity.

🟢

If Mitigated

Minimal impact with proper network segmentation, encrypted communications, and updated firmware preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: HIGH

Exploitation requires specialized knowledge of cellular protocols and proximity to target device. No public exploits available at disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Device-specific firmware updates from Samsung

Vendor Advisory: https://semiconductor.samsung.com/support/quality-support/product-security-updates/

Restart Required: Yes

Instructions:

1. Check for device firmware updates in Settings > Software Update. 2. Install available updates. 3. Restart device after installation. 4. Verify update completion in About Phone > Software Information.

🔧 Temporary Workarounds

Disable vulnerable cellular bands

android

Temporarily disable affected cellular frequency bands if supported by device

*#*#4636#*#* > Phone Information > Set preferred network type

Use Wi-Fi calling

android

Route cellular communications through encrypted Wi-Fi networks when available

Settings > Connections > Wi-Fi Calling > Enable

🧯 If You Can't Patch

  • Isolate affected devices on separate network segments with strict firewall rules
  • Implement additional encryption layers for all cellular communications using VPN or secure messaging apps

🔍 How to Verify

Check if Vulnerable:

Check device model and baseband version in Settings > About Phone > Software Information. Compare with Samsung security bulletins.

Check Version:

adb shell getprop | grep -i baseband

Verify Fix Applied:

Verify baseband firmware version matches patched versions listed in Samsung security updates. Check that May 2024 or later security patches are installed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual RRC state transitions in baseband logs
  • Multiple failed RRC reconfiguration attempts
  • Abnormal cellular protocol messages

Network Indicators:

  • Suspicious cellular traffic patterns
  • Unexpected RRC reconfiguration messages from unknown base stations
  • Anomalous signal strength variations

SIEM Query:

source="baseband_logs" AND ("RRC reconfiguration" OR "state violation")

🔗 References

📤 Share & Export