CVE-2024-32503 (GCVE-0-2024-32503)
Vulnerability from cvelistv5 – Published: 2024-06-07 15:51 – Updated: 2025-02-13 15:48
VLAI?
Summary
An issue was discovered in Samsung Mobile Processor and Wearable Processor Exynos 850, Exynos 1080, Exynos 2100, Exynos 1280, Exynos 1380, Exynos 1330, Exynos W920, Exynos W930. The mobile processor lacks proper memory deallocation checking, which can result in a UAF (Use-After-Free) vulnerability.
Severity ?
8.4 (High)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T02:13:39.067Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:h:samsung:exynos_850:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "exynos_850",
"vendor": "samsung",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:samsung:exynos_1080:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "exynos_1080",
"vendor": "samsung",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "exynos_1280",
"vendor": "samsung",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:samsung:exynos_1380:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "exynos_1380",
"vendor": "samsung",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:samsung:exynos_1330:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "exynos_1330",
"vendor": "samsung",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:samsung:exynos_w920:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "exynos_w920",
"vendor": "samsung",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:samsung:exynos_2100:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "exynos_2100",
"vendor": "samsung",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:samsung:exynos_2100:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "exynos_2100",
"vendor": "samsung",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:samsung:exynos_w930:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "exynos_w930",
"vendor": "samsung",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-32503",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-19T14:23:35.467688Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-762",
"description": "CWE-762 Mismatched Memory Management Routines",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-19T14:26:31.930Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Samsung Mobile Processor and Wearable Processor Exynos 850, Exynos 1080, Exynos 2100, Exynos 1280, Exynos 1380, Exynos 1330, Exynos W920, Exynos W930. The mobile processor lacks proper memory deallocation checking, which can result in a UAF (Use-After-Free) vulnerability."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:L/AV:L/A:H/C:H/I:H/PR:N/S:U/UI:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-06-07T15:51:56.500Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-32503",
"datePublished": "2024-06-07T15:51:56.176Z",
"dateReserved": "2024-04-15T00:00:00.000Z",
"dateUpdated": "2025-02-13T15:48:06.716Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:samsung:exynos_850_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1928760C-4FC4-45B0-84FF-C1105CD1DD2A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:samsung:exynos_850:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB410A6D-642B-49AE-8B1C-EADA953A84DA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:samsung:exynos_1080_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43DE4D6F-D662-46F2-93BC-9AE950320BDE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:samsung:exynos_1080:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE06CD56-8BFD-4208-843A-179E3E6F5C10\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:samsung:exynos_2100_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"89B88BFE-3C82-498C-8EC1-5784836DB1A1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:samsung:exynos_2100:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9385885D-654A-496E-8029-7C6D9B077193\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:samsung:exynos_1280_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD1A7B09-9031-4E54-A24F-3237C054166B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFC68046-2F08-40D1-B158-89D8D9263541\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:samsung:exynos_1380_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D381478B-C638-4663-BD71-144BE4B02E46\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:samsung:exynos_1380:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61E72146-72FE-4B54-AB79-3C665E7F016C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:samsung:exynos_1330_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2635646-DD6A-4735-8E01-F45445584832\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:samsung:exynos_1330:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA0F8A58-71B7-4503-A03A-6FB4282D75BD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:samsung:exynos_w920_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6ADED27-EDAF-4FB3-8CB2-AE5F59B93641\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:samsung:exynos_w920:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BF79654-E5C6-4DFF-B33A-A78571CD300C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:samsung:exynos_w930_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"801E188F-C71B-4933-9099-151A4A1B1BC5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:samsung:exynos_w930:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D8FC82D-57C5-4F00-BDF4-4261A32C4246\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An issue was discovered in Samsung Mobile Processor and Wearable Processor Exynos 850, Exynos 1080, Exynos 2100, Exynos 1280, Exynos 1380, Exynos 1330, Exynos W920, Exynos W930. The mobile processor lacks proper memory deallocation checking, which can result in a UAF (Use-After-Free) vulnerability.\"}, {\"lang\": \"es\", \"value\": \"Se descubri\\u00f3 un problema en el procesador m\\u00f3vil y en el procesador port\\u00e1til Samsung Exynos 850, Exynos 1080, Exynos 2100, Exynos 1280, Exynos 1380, Exynos 1330, Exynos W920, Exynos W930. El procesador m\\u00f3vil carece de una verificaci\\u00f3n adecuada de desasignaci\\u00f3n de memoria, lo que puede provocar una vulnerabilidad UAF (Use-After-Free).\"}]",
"id": "CVE-2024-32503",
"lastModified": "2024-11-21T09:15:02.893",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"cve@mitre.org\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.4, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.5, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}]}",
"published": "2024-06-07T16:15:10.507",
"references": "[{\"url\": \"https://semiconductor.samsung.com/support/quality-support/product-security-updates/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://semiconductor.samsung.com/support/quality-support/product-security-updates/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-416\"}]}, {\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-762\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-32503\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2024-06-07T16:15:10.507\",\"lastModified\":\"2024-11-21T09:15:02.893\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in Samsung Mobile Processor and Wearable Processor Exynos 850, Exynos 1080, Exynos 2100, Exynos 1280, Exynos 1380, Exynos 1330, Exynos W920, Exynos W930. The mobile processor lacks proper memory deallocation checking, which can result in a UAF (Use-After-Free) vulnerability.\"},{\"lang\":\"es\",\"value\":\"Se descubri\u00f3 un problema en el procesador m\u00f3vil y en el procesador port\u00e1til Samsung Exynos 850, Exynos 1080, Exynos 2100, Exynos 1280, Exynos 1380, Exynos 1330, Exynos W920, Exynos W930. El procesador m\u00f3vil carece de una verificaci\u00f3n adecuada de desasignaci\u00f3n de memoria, lo que puede provocar una vulnerabilidad UAF (Use-After-Free).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.5,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-762\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:exynos_850_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1928760C-4FC4-45B0-84FF-C1105CD1DD2A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:samsung:exynos_850:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB410A6D-642B-49AE-8B1C-EADA953A84DA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:exynos_1080_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43DE4D6F-D662-46F2-93BC-9AE950320BDE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:samsung:exynos_1080:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE06CD56-8BFD-4208-843A-179E3E6F5C10\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:exynos_2100_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89B88BFE-3C82-498C-8EC1-5784836DB1A1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:samsung:exynos_2100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9385885D-654A-496E-8029-7C6D9B077193\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:exynos_1280_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD1A7B09-9031-4E54-A24F-3237C054166B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFC68046-2F08-40D1-B158-89D8D9263541\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:exynos_1380_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D381478B-C638-4663-BD71-144BE4B02E46\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:samsung:exynos_1380:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61E72146-72FE-4B54-AB79-3C665E7F016C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:exynos_1330_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2635646-DD6A-4735-8E01-F45445584832\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:samsung:exynos_1330:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA0F8A58-71B7-4503-A03A-6FB4282D75BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:exynos_w920_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6ADED27-EDAF-4FB3-8CB2-AE5F59B93641\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:samsung:exynos_w920:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BF79654-E5C6-4DFF-B33A-A78571CD300C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:samsung:exynos_w930_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"801E188F-C71B-4933-9099-151A4A1B1BC5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:samsung:exynos_w930:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D8FC82D-57C5-4F00-BDF4-4261A32C4246\"}]}]}],\"references\":[{\"url\":\"https://semiconductor.samsung.com/support/quality-support/product-security-updates/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://semiconductor.samsung.com/support/quality-support/product-security-updates/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://semiconductor.samsung.com/support/quality-support/product-security-updates/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T02:13:39.067Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-32503\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-08-19T14:23:35.467688Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:h:samsung:exynos_850:-:*:*:*:*:*:*:*\"], \"vendor\": \"samsung\", \"product\": \"exynos_850\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"*\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:samsung:exynos_1080:-:*:*:*:*:*:*:*\"], \"vendor\": \"samsung\", \"product\": \"exynos_1080\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"*\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*\"], \"vendor\": \"samsung\", \"product\": \"exynos_1280\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"*\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:samsung:exynos_1380:-:*:*:*:*:*:*:*\"], \"vendor\": \"samsung\", \"product\": \"exynos_1380\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"*\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:samsung:exynos_1330:-:*:*:*:*:*:*:*\"], \"vendor\": \"samsung\", \"product\": \"exynos_1330\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"*\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:samsung:exynos_w920:-:*:*:*:*:*:*:*\"], \"vendor\": \"samsung\", \"product\": \"exynos_w920\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"*\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:samsung:exynos_2100:-:*:*:*:*:*:*:*\"], \"vendor\": \"samsung\", \"product\": \"exynos_2100\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"*\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:samsung:exynos_2100:-:*:*:*:*:*:*:*\"], \"vendor\": \"samsung\", \"product\": \"exynos_2100\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"*\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:samsung:exynos_w930:-:*:*:*:*:*:*:*\"], \"vendor\": \"samsung\", \"product\": \"exynos_w930\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"*\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-762\", \"description\": \"CWE-762 Mismatched Memory Management Routines\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-19T14:22:59.890Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.4, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AC:L/AV:L/A:H/C:H/I:H/PR:N/S:U/UI:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://semiconductor.samsung.com/support/quality-support/product-security-updates/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"An issue was discovered in Samsung Mobile Processor and Wearable Processor Exynos 850, Exynos 1080, Exynos 2100, Exynos 1280, Exynos 1380, Exynos 1330, Exynos W920, Exynos W930. The mobile processor lacks proper memory deallocation checking, which can result in a UAF (Use-After-Free) vulnerability.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2024-06-07T15:51:56.500799\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-32503\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-19T14:26:31.930Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…