CVE-2024-29153

8.1 HIGH

📋 TL;DR

This vulnerability in Samsung Exynos processors and modems allows attackers to exploit incorrect LTE NAS message authorization, forcing devices to downgrade to older network generations and enabling repeated denial-of-service attacks. It affects Samsung mobile devices, wearables, and modems using the listed Exynos chipsets. The vulnerability is network-based and can be exploited remotely.

💻 Affected Systems

Products:
  • Samsung Mobile Processor
  • Samsung Wearable Processor
  • Samsung Modems
Versions: Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, Exynos Modem 5300
Operating Systems: Android-based systems using affected chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with cellular connectivity using the listed Exynos chipsets. Vulnerability is in the baseband/firmware layer.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could persistently disrupt cellular connectivity for affected devices, causing service outages, draining battery through repeated connection attempts, and potentially enabling man-in-the-middle attacks by forcing connections to less secure network generations.

🟠

Likely Case

Targeted denial-of-service attacks against specific devices or groups of devices, causing temporary loss of cellular connectivity and increased battery consumption.

🟢

If Mitigated

Limited impact with proper network monitoring and timely patching, though some service disruption may still occur during attack attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specially crafted LTE NAS messages to the target device. No authentication is required as the attack occurs at the network protocol level.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Samsung security updates for specific device firmware versions

Vendor Advisory: https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-29153/

Restart Required: Yes

Instructions:

1. Check for available firmware updates on affected Samsung devices. 2. Apply the latest security update from Samsung. 3. Restart the device after update installation. 4. Verify the update was successful by checking the firmware version.

🔧 Temporary Workarounds

Disable LTE/5G connectivity

android

Force device to use older network technologies (3G/2G) that are not vulnerable to this specific attack

Enable airplane mode when not needed

all

Temporarily disable all cellular connectivity to prevent exploitation

🧯 If You Can't Patch

  • Monitor for unusual network downgrade events and repeated connection attempts in cellular network logs
  • Implement network-level filtering for suspicious LTE NAS messages if possible through carrier infrastructure

🔍 How to Verify

Check if Vulnerable:

Check device model and chipset information in Settings > About Phone > Hardware Information. If using an affected Exynos chipset, the device is vulnerable.

Check Version:

Settings > About Phone > Software Information > Build Number / Baseband Version

Verify Fix Applied:

Check firmware version after update and verify it's newer than the vulnerable versions listed in Samsung's security advisory.

📡 Detection & Monitoring

Log Indicators:

  • Repeated network generation downgrades in cellular logs
  • Abnormal LTE NAS message patterns
  • Frequent connection resets

Network Indicators:

  • Unusual LTE control plane traffic patterns
  • Suspicious NAS messages forcing network downgrades

SIEM Query:

Search for cellular network logs showing repeated RRC connection releases followed by downgrades to 3G/2G

🔗 References

📤 Share & Export