Cyber Posture

CVE-2024-52924

High

Published: 06 March 2025

Published
06 March 2025
Modified
01 July 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0019 40.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.

Security Summary

CVE-2024-52924 is a stack-based buffer overflow vulnerability (CWE-121) discovered in the NRMM component of Samsung Mobile Processor, Wearable Processor, and Modem Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. The flaw arises from a lack of boundary checks during the decoding of Registration Accept messages, potentially leading to out-of-bounds writes on the stack. It carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and was published on 2025-03-06.

The vulnerability can be exploited by remote attackers over the network with low attack complexity, requiring no authentication privileges or user interaction. Exploitation triggers out-of-bounds stack writes, resulting in high-impact denial-of-service conditions through availability disruption, such as process crashes, while confidentiality and integrity remain unaffected.

Samsung provides mitigation details through product security updates published on their semiconductor support page at https://semiconductor.samsung.com/support/quality-support/product-security-updates/.

Details

CWE(s)
CWE-121

Affected Products

samsung
exynos 9820 firmware
all versions
samsung
exynos 9825 firmware
all versions
samsung
exynos 980 firmware
all versions
samsung
exynos 990 firmware
all versions
samsung
exynos 850 firmware
all versions
samsung
exynos 1080 firmware
all versions
samsung
exynos 2100 firmware
all versions
samsung
exynos 1280 firmware
all versions
samsung
exynos 2200 firmware
all versions
samsung
exynos 1330 firmware
all versions
+10 more product configuration(s) — see NVD for full list

MITRE ATT&CK Enterprise Techniques

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

The remote stack-based buffer overflow in NRMM message decoding directly enables exploitation resulting in process crashes and denial of service on the affected mobile/modem component.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References