Impact
The vulnerability originates from improper handling of a downlink NAS transport packet by Samsung Exynos and modem firmware, causing the system to consume excessive resources and ultimately crash or reboot. This results in device unavailability and loss of network connectivity for the affected device. The weakness is classified as a resource exhaustion flaw (CWE‑400).
Affected Systems
Sectors of Samsung Exynos mobile processors, such as the 850, 980, 990, 1080, 1280, 1330, 1380, 1480, 1580, 2100, 2200, 2400 and 2500 models; wearable processors including the 9110, W920, W930, W1000; and modem units 5123, 5300 and 5400 are impacted. All corresponding firmware images for these chips are susceptible to the defect.
Risk and Exploitability
The CVSS base score of 7.5 places the vulnerability in the high severity category. EPSS indicates a very low probability of observed exploitation (<1 %). The defect is not listed in CISA’s KEV catalogue. The likely attack vector is a malicious DL NAS transport packet that reaches the device through the cellular network. Based on the description, it is inferred that the attacker does not require privileged access; the flaw would be triggered by delivering a crafted packet to the vulnerable firmware.
OpenCVE Enrichment