CVE-2024-58101

8.1 HIGH

📋 TL;DR

Samsung Galaxy Buds and Galaxy Buds 2 audio devices are vulnerable to unauthorized Bluetooth pairing by default, allowing attackers within Bluetooth range to take over audio playback or record microphone input without user consent. This affects users of these specific Samsung earbud models. The vendor considers this low severity despite the high CVSS score.

💻 Affected Systems

Products:
  • Samsung Galaxy Buds
  • Samsung Galaxy Buds 2
Versions: All versions prior to firmware update
Operating Systems: Not applicable - firmware vulnerability
Default Config Vulnerable: ⚠️ Yes
Notes: Devices are vulnerable out-of-the-box with default Bluetooth pairing settings. The vulnerability exists in the firmware's Bluetooth implementation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker within Bluetooth range could silently record private conversations through the microphone or inject malicious audio into the user's ears without any notification.

🟠

Likely Case

Opportunistic attackers in public spaces could connect to vulnerable earbuds and play unwanted audio or potentially eavesdrop on conversations.

🟢

If Mitigated

With proper controls like disabling Bluetooth when not in use, the attack window is limited to brief periods when earbuds are powered on and in pairing mode.

🌐 Internet-Facing: LOW - This is a Bluetooth proximity attack requiring physical proximity, not internet-based.
🏢 Internal Only: MEDIUM - Within office or public spaces, attackers within ~10 meters could exploit this without network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only standard Bluetooth tools and proximity to the target device. The vulnerability is well-documented in the public disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest firmware update from Samsung

Vendor Advisory: https://security.samsungmobile.com/securityUpdate.smsb

Restart Required: Yes

Instructions:

1. Open Samsung Galaxy Wearable app on paired smartphone. 2. Navigate to Earbuds settings. 3. Check for firmware updates. 4. Install available update. 5. Earbuds will restart automatically after update.

🔧 Temporary Workarounds

Disable Bluetooth when not in use

all

Turn off Bluetooth on earbuds or smartphone to prevent unauthorized pairing attempts

Use secure pairing mode

all

Only pair earbuds in controlled environments and avoid leaving them in discoverable mode

🧯 If You Can't Patch

  • Keep earbuds in charging case when not actively using them to disable Bluetooth
  • Only use earbuds in trusted environments and avoid public spaces where attackers might be present

🔍 How to Verify

Check if Vulnerable:

Check if earbuds are discoverable by other Bluetooth devices without user interaction. If they appear in other devices' Bluetooth lists without pressing any buttons, they are vulnerable.

Check Version:

Open Samsung Galaxy Wearable app → Earbuds settings → About earbuds → Check firmware version

Verify Fix Applied:

After firmware update, verify that earbuds no longer appear in other devices' Bluetooth lists without explicit user pairing action.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Bluetooth pairing events in smartphone logs
  • Multiple failed pairing attempts from unknown devices

Network Indicators:

  • Bluetooth scanning tools detecting unauthorized connections to earbuds

SIEM Query:

Not applicable - this is a Bluetooth/local attack not typically logged in enterprise SIEM systems

🔗 References

📤 Share & Export