CVE-2024-56427

6.5 MEDIUM

📋 TL;DR

This vulnerability in Samsung Exynos processors allows attackers to trigger out-of-bounds memory access by sending malformed RRC (Radio Resource Control) packets. This affects mobile devices and wearables using the listed Exynos chipsets, potentially compromising the modem subsystem.

💻 Affected Systems

Products:
  • Samsung Mobile Processor Exynos 980
  • Samsung Mobile Processor Exynos 990
  • Samsung Mobile Processor Exynos 850
  • Samsung Mobile Processor Exynos 1080
  • Samsung Mobile Processor Exynos 2100
  • Samsung Mobile Processor Exynos 1280
  • Samsung Mobile Processor Exynos 2200
  • Samsung Mobile Processor Exynos 1330
  • Samsung Mobile Processor Exynos 1380
  • Samsung Mobile Processor Exynos 1480
  • Samsung Mobile Processor Exynos 2400
  • Samsung Wearable Processor Exynos 9110
  • Samsung Wearable Processor Exynos W920
  • Samsung Wearable Processor Exynos W930
  • Samsung Wearable Processor Exynos W1000
  • Samsung Modem 5123
  • Samsung Modem 5300
  • Samsung Modem 5400
Versions: All versions prior to security patches
Operating Systems: Android, Wear OS, Tizen
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with these chipsets regardless of manufacturer. The vulnerability is in the modem/baseband firmware.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution on the modem processor leading to device compromise, eavesdropping on communications, or denial of service.

🟠

Likely Case

Modem crash or instability requiring device reboot, potentially disrupting cellular connectivity.

🟢

If Mitigated

Limited impact if network filtering blocks malicious RRC packets before reaching devices.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specially crafted RRC packets to the target device's modem, typically over cellular networks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Device-specific firmware updates containing modem patches

Vendor Advisory: https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-56427/

Restart Required: Yes

Instructions:

1. Check for device firmware updates from manufacturer. 2. Apply available security updates. 3. Reboot device after update installation.

🔧 Temporary Workarounds

Network filtering

all

Implement network-level filtering to block malformed RRC packets

🧯 If You Can't Patch

  • Monitor for unusual modem crashes or connectivity issues
  • Consider limiting device exposure to untrusted cellular networks

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against manufacturer's patched versions list

Check Version:

Device-specific (e.g., Android: Settings > About phone > Software information)

Verify Fix Applied:

Confirm device has received latest security updates and modem firmware version matches patched releases

📡 Detection & Monitoring

Log Indicators:

  • Modem crash logs
  • Unexpected baseband resets
  • RRC protocol errors

Network Indicators:

  • Unusual RRC packet patterns
  • Suspicious cellular network traffic

SIEM Query:

Search for modem/baseband crash events or RRC protocol anomalies

🔗 References

📤 Share & Export