175
CVEs
16
Critical
54
High
1
KEV
1
PoC
62
Unpatched C/H
8.6%
Patch Rate
0.4%
Avg EPSS
Severity Breakdown
CRITICAL
16
HIGH
54
MEDIUM
100
LOW
3
Monthly CVE Trend
Affected Products (30)
Exynos 1480 Firmware
60
Exynos 1380 Firmware
59
Exynos 2400 Firmware
52
Exynos 1280 Firmware
49
Exynos 2200 Firmware
41
Exynos 1330 Firmware
39
Exynos 980 Firmware
37
Exynos 1080 Firmware
36
Exynos 850 Firmware
34
Exynos W1000 Firmware
32
Exynos 1580 Firmware
32
Exynos W920 Firmware
31
Exynos W930 Firmware
31
Exynos 2100 Firmware
26
Memory Corruption
25
Exynos 990 Firmware
25
Notes
24
Exynos 9110 Firmware
17
Exynos 2500 Firmware
16
Exynos Modem 5123 Firmware
13
Exynos Modem 5300 Firmware
13
Android
12
Null Pointer Dereference
10
Exynos Modem 5400 Firmware
9
Use After Free
9
Linux Kernel
9
Modem 5123 Firmware
7
Exynos 9820 Firmware
7
Modem 5400 Firmware
7
Exynos 9825 Firmware
7
Top Risky CVEs
| CVE | Summary | Severity | CVSS | EPSS | Priority | Signals |
|---|---|---|---|---|---|---|
| CVE-2025-4632 | Samsung MagicINFO 9 Server contains a path traversal vulnerability allowing unauthenticated attackers to write arbitrary files as SYSTEM authority, enabling complete server compromise. | CRITICAL | 9.8 | 49.2% | 148 |
KEV
|
| CVE-2025-54328 | Stack-based buffer overflow in Samsung Exynos chipset SMS message processing allows remote attackers to execute arbitrary code or crash devices via malformed SMS RP-DATA messages. Affects 22 Exynos processor and modem variants across mobile, wearable, and IoT devices, requiring no user interaction. CVSS 10.0 with network-level attack vector (PR:N), scope change, and full system impact. EPSS and exploitation status not provided, but SSVC framework indicates automatable attack with total technical impact. No public exploit identified at time of analysis, though the vulnerability class (CWE-121 stack buffer overflow in SMS parsing) has high weaponization potential. | CRITICAL | 10.0 | 0.1% | 50 |
No patch
|
| CVE-2025-53076 | Improper Input Validation vulnerability in Samsung Open Source rLottie allows Overread Buffers.This issue affects rLottie: V0.2. | CRITICAL | 9.8 | 0.1% | 49 |
|
| CVE-2025-53075 | Improper Input Validation vulnerability in Samsung Open Source rLottie allows Path Traversal.This issue affects rLottie: V0.2. | CRITICAL | 9.8 | 0.1% | 49 |
|
| CVE-2025-0634 | Use After Free vulnerability in Samsung Open Source rLottie allows Remote Code Inclusion.This issue affects rLottie: V0.2. | CRITICAL | 9.8 | 0.0% | 49 |
|
| CVE-2025-52909 | Buffer overflow in Samsung Exynos Wi-Fi drivers (980, 850, 1280, 1330, 1380, 1480, 1580, W920, W930, W1000) allows unauthenticated remote attackers to execute arbitrary code with high integrity/confidentiality impact through malformed NL80211 vendor command ioctl messages. Improper input validation enables network-accessible exploitation without user interaction. CVSS 9.8 critical severity. No public exploit identified at time of analysis. | CRITICAL | 9.8 | 0.0% | 49 |
No patch
|
| CVE-2025-62818 | Out-of-bounds write in Samsung Exynos chipsets (processors 980/990/850/1080/2100/1280/2200/1330/1380/1480/2400/1580/2500/9110, wearables W920/W930/W1000, modems 5123/5300/5400) allows unauthenticated remote attackers to achieve arbitrary code execution via malformed SMS TP-UD packets. Exploitation occurs through TP-UDHI/UDL value mismatch during SMS message parsing, enabling network-level attacks without user interaction. No public exploit identified at time of analysis. | CRITICAL | 9.8 | 0.0% | 49 |
No patch
|
| CVE-2025-52908 | Buffer overflow in Samsung Exynos Wi-Fi driver (980, 850, 1280, 1330, 1380, 1480, 1580, W920, W930, W1000) allows unauthenticated remote code execution via malformed NL80211 vendor command ioctl message. Incorrect handling of vendor-specific wireless configuration commands enables network-based memory corruption. CVSS 9.8 critical severity reflects network attack vector requiring no authentication or user interaction. No public exploit identified at time of analysis. Low observed exploitation activity (EPSS 0.01%). | CRITICAL | 9.8 | 0.0% | 49 |
No patch
|
| CVE-2025-23099 | OOB write in Samsung Exynos 1480/2400 processors. | CRITICAL | 9.1 | 0.1% | 46 |
No patch
|
| CVE-2025-23097 | OOB write in Samsung Exynos 1380 processor. | CRITICAL | 9.1 | 0.1% | 46 |
No patch
|
| CVE-2025-53074 | Out-of-bounds Read vulnerability in Samsung Open Source rLottie allows Overflow Buffers.This issue affects rLottie: V0.2. | CRITICAL | 9.1 | 0.1% | 46 |
|
| CVE-2025-47202 | In RRC in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400, the lack of a length check leads to out-of-bounds writes. | CRITICAL | 9.1 | 0.1% | 46 |
No patch
|
| CVE-2025-27807 | Samsung Exynos processors (multiple models including 980, 990, 2100, 2200, 2400) and modems have an out-of-bounds write via malformed NAS (Non-Access Stratum) packets. This baseband vulnerability can be exploited over the cellular network without user interaction, potentially affecting millions of devices. | CRITICAL | 9.1 | 0.1% | 46 |
No patch
|
| CVE-2025-58349 | Baseband denial-of-service in Samsung Exynos chipsets (980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 9110, W920, W930, W1000, Modem 5123, 5300, 5400) allows remote attackers to crash mobile device basebands via malformed LTE MAC packets without authentication. The vulnerability affects the L2 layer processing of MAC Control Elements, enabling network-based attacks against cellular connectivity. EPSS score of 0.02% indicates low observed exploitation probability, and no public exploit identified at time of analysis, though the CVSS score of 9.1 reflects the severity of remotely disrupting critical cellular communications infrastructure. | CRITICAL | 9.1 | 0.0% | 46 |
No patch
|
| CVE-2025-23102 | Double-free vulnerability in Samsung's Exynos mobile processors (models 980, 990, 1080, 2100, 1280, 2200, 1380, 1480, and 2400) that enables privilege escalation. An authenticated attacker with local access can trigger the memory corruption flaw to gain elevated privileges on affected devices. With a CVSS score of 8.8 and network accessibility (AV:N), this represents a critical risk for Samsung mobile device users, particularly if the vulnerability is actively exploited in-the-wild. | HIGH | 8.8 | 0.1% | 44 |
No patch
|