EUVD-2025-16784

| CVE-2025-23100 HIGH
2025-06-03 [email protected]
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
EUVD ID Assigned
Mar 14, 2026 - 17:04 euvd
EUVD-2025-16784
Analysis Generated
Mar 14, 2026 - 17:04 vuln.today
CVE Published
Jun 03, 2025 - 20:15 nvd
HIGH 7.5

Description

An issue was discovered in Samsung Mobile Processor Exynos 1280, 2200, 1380, 1480, 2400. The absence of a NULL check leads to a Denial of Service.

Analysis

NULL pointer dereference vulnerability in Samsung's Exynos mobile processors (models 1280, 2200, 1380, 1480, 2400) that allows unauthenticated remote attackers to trigger a denial of service condition without user interaction. The vulnerability has a CVSS 3.1 score of 7.5 (High) with network-based attack vector and high availability impact, though no integrity or confidentiality compromise occurs. Exploitation likelihood and active weaponization status cannot be confirmed without KEV catalog verification and public exploit availability data.

Technical Context

The vulnerability exists in Samsung's Exynos System-on-Chip (SoC) firmware or kernel-level processor handling code, affecting multiple processor generations used in Samsung Galaxy smartphones and tablets. The root cause is classified as CWE-476 (NULL Pointer Dereference), indicating insufficient input validation or null pointer checks before dereferencing memory addresses in processor-level code paths. Affected Exynos models (1280, 2200, 1380, 1480, 2400) span multiple processor generations with varying architectures and process nodes. The vulnerability likely exists in GPU drivers, modem firmware, or memory management subsystems that process untrusted network or IPC data without proper null validation. CPE entries would typically follow: cpe:2.3:o:samsung:exynos_1280_firmware:*:*:*:*:*:*:*:* and similar for other models.

Affected Products

Samsung Mobile Processor Exynos product line: (1) Exynos 1280 - entry-level/mid-range processor used in Galaxy A-series devices; (2) Exynos 2200 - flagship processor used in Galaxy S22 series (select markets); (3) Exynos 1380 - mid-range processor for Galaxy A-series 2023 models; (4) Exynos 1480 - mid-range processor for Galaxy A-series 2024 models; (5) Exynos 2400 - flagship processor for Galaxy S24 series. Affected devices include Samsung Galaxy S22, S23, S24 (Exynos variants), Galaxy A13-A15, A23-A25, A33-A35, A51-A55, Galaxy Tab S8/S9/S10 series (Exynos variants), and other A/M-series devices. Geographic and market segmentation applies—Exynos variants primarily in Europe, Asia, and non-US markets. Specific firmware version ranges and security patch levels requiring remediation require cross-reference with Samsung security advisories (typically published on samsung.com/security and Android security bulletins).

Remediation

Apply Samsung security patches targeting Exynos processor firmware and kernel security updates: (1) Check device's current security patch level via Settings > About phone > Security patch date; (2) Install latest available OTA (Over-The-Air) updates for affected Exynos models via Settings > System > System update; (3) For enterprise deployments, coordinate with Samsung Mobile Device Management (MDM) vendors and Samsung Knox services for centralized patch deployment; (4) Monitor Samsung Security Center (https://security.samsungmobile.com/) and Android Security & Privacy Year in Review for specific Exynos CVE patches and target patch dates; (5) If patch unavailable for legacy devices (Exynos 1280/2200 variants), implement network-level DoS mitigation via rate limiting, anomaly detection, and segmentation of affected device traffic. Vendor advisory links should be extracted from Samsung's official security bulletins once published; contact Samsung Mobile Enterprise Relations for extended support timelines on older processor generations.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +38
POC: 0

Share

EUVD-2025-16784 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy