CVE-2024-49197

6.5 MEDIUM

📋 TL;DR

This vulnerability in Samsung Exynos Wi-Fi chips allows out-of-bounds memory access due to missing boundary checks in the STOP_KEEP_ALIVE_OFFLOAD function. Attackers could potentially execute arbitrary code or cause denial of service on affected devices. This affects Samsung smartphones and wearables using the listed Exynos processors.

💻 Affected Systems

Products:
  • Samsung smartphones and wearables with Exynos 980, 850, 1080, 1280, 1330, 1380, 1480, W920, W930, W1000 processors
Versions: All versions before security patch
Operating Systems: Android-based Samsung devices
Default Config Vulnerable: ⚠️ Yes
Notes: Devices must have Wi-Fi enabled and be within range of attacker's network.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, data theft, or persistent malware installation.

🟠

Likely Case

Device crash/reboot (denial of service) or limited information disclosure from memory.

🟢

If Mitigated

Minimal impact if patched or with proper network segmentation.

🌐 Internet-Facing: MEDIUM - Requires proximity to Wi-Fi network but no authentication needed.
🏢 Internal Only: MEDIUM - Same attack vector applies internally if attacker has network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires proximity to target device and Wi-Fi network access, but no user interaction or authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest Samsung security updates

Vendor Advisory: https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-49197/

Restart Required: Yes

Instructions:

1. Check for Samsung security updates in device settings. 2. Install latest available update. 3. Restart device after installation.

🔧 Temporary Workarounds

Disable Wi-Fi when not needed

android

Turn off Wi-Fi to prevent exploitation via this vector

Settings > Connections > Wi-Fi > Toggle off

Use trusted networks only

all

Avoid connecting to untrusted or public Wi-Fi networks

🧯 If You Can't Patch

  • Segment network to isolate vulnerable devices from untrusted networks
  • Implement network monitoring for unusual Wi-Fi traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check device model and processor in Settings > About phone > Model number and Hardware info

Check Version:

Settings > About phone > Software information

Verify Fix Applied:

Verify security patch level in Settings > About phone > Software information > Android security patch level is current

📡 Detection & Monitoring

Log Indicators:

  • Wi-Fi driver crashes
  • Kernel panic logs
  • Unexpected device reboots

Network Indicators:

  • Unusual Wi-Fi management frame patterns
  • Malformed STOP_KEEP_ALIVE_OFFLOAD packets

SIEM Query:

device_logs WHERE (process="wifi_driver" AND event="crash") OR (event="kernel_panic")

🔗 References

📤 Share & Export