Impact
An incorrect processing of an NL80211 vendor command in the Wi‑Fi driver of several Samsung Exynos processors creates a buffer overflow. The flaw, classified as CWE‑120, can corrupt memory when an attacker sends a crafted ioctl message. If successfully exploited, an attacker could achieve arbitrary code execution, compromising the confidentiality, integrity, or availability of the affected device.
Affected Systems
The vulnerability affects Samsung mobile and wearable processors including the Exynos 980, 850, 1280, 1330, 1380, 1480, 1580, W920, W930, and W1000, as well as their associated firmware. No specific version ranges are supplied, implying all current releases are potentially susceptible until a patch is applied.
Risk and Exploitability
With a CVSS score of 9.8, the flaw is high severity. However, the EPSS score of less than 1% suggests it is not widely exploited yet, and it is not listed in CISA’s KEV catalog. Exploitation would likely need a local attacker to send a malicious NL80211 vendor command to the Wi‑Fi driver via ioctl. Given the potential impact, the issue should be treated as a high‑risk problem.
OpenCVE Enrichment