EUVD-2025-209249

| CVE-2025-54601 HIGH
2026-04-06 mitre GHSA-q6xr-vv6x-m5gj
7.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Apr 06, 2026 - 21:00 vuln.today
EUVD ID Assigned
Apr 06, 2026 - 21:00 euvd
EUVD-2025-209249
CVE Published
Apr 06, 2026 - 00:00 nvd
HIGH 7.0

Description

An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor amd Wearable Processor Exynos 980, 850, 1080, 1280, 1330, 1380, 1480, 1580, W920, W930, and W1000. Improper synchronization on a global variable leads to a double free. An attacker can trigger a race condition by invoking an ioctl function concurrently from multiple threads.

Analysis

Race condition in Samsung Exynos Wi-Fi drivers enables local privilege escalation to kernel execution via double-free memory corruption. Affects 11 mobile and wearable processors (Exynos 980, 850, 1080, 1280, 1330, 1380, 1480, 1580, W920, W930, W1000). Local attackers with low privileges can trigger memory corruption by racing ioctl calls across threads, achieving high confidentiality, integrity, and availability impact. EPSS score of 0.02% (5th percentile) suggests minimal real-world exploitation likelihood despite CVSS 7.0 severity. No public exploit identified at time of analysis.

Technical Context

This vulnerability stems from CWE-362 (Concurrent Execution using Shared Resource with Improper Synchronization) in the Wi-Fi kernel driver implementation for Samsung Exynos chipsets. The driver improperly manages concurrent access to a global variable when handling ioctl system calls, creating a time-of-check-to-time-of-use (TOCTOU) race window. When multiple threads invoke the vulnerable ioctl function simultaneously, the unsynchronized state can cause the same memory region to be freed twice (double-free condition). Double-free vulnerabilities in kernel space are particularly severe as they corrupt kernel heap metadata, potentially allowing attackers to manipulate memory allocators and achieve arbitrary code execution at ring-0 privilege level. The affected processors span Samsung's mobile (Exynos 980/1080/1280/1330/1380/1480/1580) and wearable (W920/W930/W1000) product lines, plus the cost-optimized 850 chipset, indicating widespread deployment in Android smartphones, tablets, and Galaxy Watch devices.

Affected Products

Samsung Mobile Processor Exynos models 980, 850, 1080, 1280, 1330, 1380, 1480, and 1580, along with Wearable Processor Exynos W920, W930, and W1000 are confirmed vulnerable in their Wi-Fi driver implementations. These chipsets power various Samsung Galaxy smartphones, tablets, and smartwatch devices across multiple product generations. Specific device models and firmware versions were not disclosed in the advisory. The vendor has published security guidance at https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-54601/ with additional context available in their general product security updates portal.

Remediation

Samsung has acknowledged the vulnerability through their semiconductor security portal and published advisory documentation at https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-54601/. Device manufacturers (OEMs) using affected Exynos chipsets should monitor Samsung's security bulletin for firmware updates containing synchronized ioctl handling in the Wi-Fi driver. End users should apply security patches distributed through Android security updates as they become available from device manufacturers. Organizations managing Samsung-powered mobile fleets should prioritize patching for devices with elevated exposure to untrusted applications or physical access scenarios. No workarounds were identified in available advisories. Until patches deploy, defense-in-depth measures include restricting installation of untrusted applications via mobile device management policies and enabling Android's verified boot to detect kernel tampering attempts.

Priority Score

35
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +35
POC: 0

Share

EUVD-2025-209249 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy