Multiple vulnerabilities in Samsung products



Risk High
Patch available YES
Number of vulnerabilities 5
CVE-ID CVE-2024-49196
CVE-2024-52924
CVE-2024-52923
CVE-2024-50600
CVE-2024-49198
CWE-ID CWE-843
CWE-787
CWE-119
Exploitation vector Network
Public exploit N/A
Vulnerable software
Exynos 1480
Hardware solutions / Firmware

Exynos 2400
Hardware solutions / Firmware

Exynos 980
Hardware solutions / Firmware

Exynos 850
Hardware solutions / Firmware

Exynos 1080
Hardware solutions / Firmware

Exynos 2100
Hardware solutions / Firmware

Exynos 1280
Hardware solutions / Firmware

Exynos 2200
Hardware solutions / Firmware

Exynos 1330
Hardware solutions / Firmware

Exynos 1380
Hardware solutions / Firmware

Exynos 9110
Hardware solutions / Firmware

Exynos W920
Hardware solutions / Firmware

Exynos W930
Hardware solutions / Firmware

Exynos W1000
Hardware solutions / Firmware

Exynos Modem 5123
Hardware solutions / Firmware

Exynos Modem 5300
Hardware solutions / Firmware

Exynos Modem 5400
Hardware solutions / Firmware

Exynos 9820
Mobile applications / Mobile firmware & hardware

Exynos 9825
Mobile applications / Mobile firmware & hardware

Exynos 990
Mobile applications / Mobile firmware & hardware

Vendor Samsung

Security Bulletin

This security bulletin contains information about 5 vulnerabilities.

1) Type Confusion

EUVDB-ID: #VU105170

Risk: High

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2024-49196

CWE-ID: CWE-843 - Type confusion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a type confusion error. A remote attacker can pass specially crafted data to the application, trigger a type confusion error and cause a denial of service comdition on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Exynos 1480: All versions

Exynos 2400: All versions

CPE2.3 External links

https://semiconductor.samsung.com/content/semiconductor/global/support/quality-support/product-security-updates/cve-2024-49196/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Out-of-bounds write

EUVDB-ID: #VU105174

Risk: High

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2024-52924

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error during the decoding of Registration Accept messages. A remote attacker can trigger an out-of-bounds write and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Exynos 9820: All versions

Exynos 9825: All versions

Exynos 980: All versions

Exynos 990: All versions

Exynos 850: All versions

Exynos 1080: All versions

Exynos 2100: All versions

Exynos 1280: All versions

Exynos 2200: All versions

Exynos 1330: All versions

Exynos 1380: All versions

Exynos 1480: All versions

Exynos 2400: All versions

Exynos 9110: All versions

Exynos W920: All versions

Exynos W930: All versions

Exynos W1000: All versions

Exynos Modem 5123: All versions

Exynos Modem 5300: All versions

Exynos Modem 5400: All versions

CPE2.3 External links

https://semiconductor.samsung.com/content/semiconductor/global/support/quality-support/product-security-updates/cve-2024-52924/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Buffer overflow

EUVDB-ID: #VU105173

Risk: High

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2024-52923

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error during decoding of DL NAS Transport messages. A remote attacker can trigger memory corruption and cause a denial of service condition on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Exynos 9820: All versions

Exynos 9825: All versions

Exynos 980: All versions

Exynos 990: All versions

Exynos 850: All versions

Exynos 1080: All versions

Exynos 2100: All versions

Exynos 1280: All versions

Exynos 2200: All versions

Exynos 1330: All versions

Exynos 1380: All versions

Exynos 1480: All versions

Exynos 2400: All versions

Exynos 9110: All versions

Exynos W920: All versions

Exynos W930: All versions

Exynos W1000: All versions

Exynos Modem 5123: All versions

Exynos Modem 5300: All versions

Exynos Modem 5400: All versions

CPE2.3 External links

https://semiconductor.samsung.com/content/semiconductor/global/support/quality-support/product-security-updates/cve-2024-52923/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Buffer overflow

EUVDB-ID: #VU105172

Risk: High

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2024-50600

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to a boundary error in STOP_KEEP_ALIVE_OFFLOAD. A remote attacker can trigger memory corruption and gain access to the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Exynos 980: All versions

Exynos 850: All versions

Exynos 1080: All versions

Exynos 1280: All versions

Exynos 1330: All versions

Exynos 1380: All versions

Exynos 1480: All versions

Exynos W920: All versions

Exynos W930: All versions

Exynos W1000: All versions

CPE2.3 External links

https://semiconductor.samsung.com/content/semiconductor/global/support/quality-support/product-security-updates/cve-2024-50600/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Buffer overflow

EUVDB-ID: #VU105171

Risk: High

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2024-49198

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to a boundary error in START_KEEP_ALIVE_OFFLOAD. A remote attacker can trigger memory corruption and gain access to the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Exynos 980: All versions

Exynos 850: All versions

Exynos 1080: All versions

Exynos 1280: All versions

Exynos 1330: All versions

Exynos 1380: All versions

Exynos 1480: All versions

Exynos W920: All versions

Exynos W930: All versions

Exynos W1000: All versions

CPE2.3 External links

https://semiconductor.samsung.com/content/semiconductor/global/support/quality-support/product-security-updates/cve-2024-49198/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###