SB2024010838 - Multiple vulnerabilities in Samsung Mobile Firmware



SB2024010838 - Multiple vulnerabilities in Samsung Mobile Firmware

Published: January 8, 2024 Updated: February 13, 2026

Security Bulletin ID SB2024010838
Severity
Critical
Patch available
YES
Number of vulnerabilities 81
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 1% High 7% Medium 7% Low 84%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 81 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2022-48454)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to a possible out of bounds write due to a missing bounds check within the wifi service in Android. A local application can execute arbitrary code.


2) Improper input validation (CVE-ID: CVE-2024-0018)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Media Codecs component. A local application can execute arbitrary code.


3) Improper input validation (CVE-ID: CVE-2024-0015)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


4) Improper input validation (CVE-ID: CVE-2023-21245)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


5) Incorrect Comparison (CVE-ID: CVE-2023-32818)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to type confusion within vdec. A local privileged application can execute arbitrary code.


6) Memory corruption (CVE-ID: CVE-2022-48456)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to a possible out of bounds write due to a incorrect bounds check within the camera driver in Kernel. A local application can execute arbitrary code.


7) Stack-based buffer overflow (CVE-ID: CVE-2022-48461)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to a possible out of bounds write due to a missing bounds check within the sensor driver in Kernel. A local application can execute arbitrary code.


8) Buffer overflow (CVE-ID: CVE-2022-48455)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to a possible out of bounds write due to a missing bounds check within the wifi service in Android. A local application can execute arbitrary code.


9) Incorrect Permission Assignment for Critical Resource (CVE-ID: CVE-2022-48459)

The vulnerability allows a local application to crash the entire system.

The vulnerability exists due to a possible system crash due to improper input validation within the TeleService in Android. A local application can crash the entire system.


10) Information exposure (CVE-ID: CVE-2024-0019)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.


11) Incorrect Permission Assignment for Critical Resource (CVE-ID: CVE-2022-48458)

The vulnerability allows a local application to crash the entire system.

The vulnerability exists due to a possible system crash due to improper input validation within the TeleService in Android. A local application can crash the entire system.


12) Incorrect Permission Assignment for Critical Resource (CVE-ID: CVE-2022-48457)

The vulnerability allows a local application to crash the entire system.

The vulnerability exists due to a possible system crash due to improper input validation within the TeleService in Android. A local application can crash the entire system.


13) Input validation error (CVE-ID: CVE-2023-45779)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input within the System UI in Misc OEM components. A local application can execute arbitrary code with elevated privileges.


14) Buffer overflow (CVE-ID: CVE-2023-33087)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Core. A local application can execute arbitrary code.


15) Improper Validation of Array Index (CVE-ID: CVE-2023-33053)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Kernel. A local application can execute arbitrary code.


16) Use-after-free (CVE-ID: CVE-2023-33063)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error during a remote call from HLOS to DSP. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.

Note, the vulnerability is being actively exploited in the wild.


17) Use of Out-of-range Pointer Offset (CVE-ID: CVE-2023-33106)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error while submitting a large list of sync points in an AUX command to the IOCTL_KGSL_GPU_AUX_COMMAND. A local user can trigger memory corruption and execute arbitrary code with elevated privileges.

Note, the vulnerability is being actively exploited in the wild.


18) Integer overflow (CVE-ID: CVE-2023-33107)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow while assigning shared virtual memory region during IOCTL call. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.

Note, the vulnerability is being actively exploited in the wild.


19) Improper input validation (CVE-ID: CVE-2024-0023)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


20) Improper input validation (CVE-ID: CVE-2024-0021)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


21) Use of Out-of-range Pointer Offset (CVE-ID: CVE-2023-33079)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Audio. A local application can execute arbitrary code.


22) Reachable Assertion (CVE-ID: CVE-2023-32843)

The vulnerability allows a local application to perform service disruption.

The vulnerability exists due to improper error handling within 5G Modem. A local application can perform service disruption.


23) Improper Authentication (CVE-ID: CVE-2024-20803)

The vulnerability allows an attacker to bypass authentication process.

The vulnerability exists due to an error in Bluetooth pairing process. An attacker with physical proximity to device can establish pairing process without user interaction.


24) Path traversal (CVE-ID: CVE-2024-20804)

The vulnerability allows a remote attacker to overwrite arbitrary files on the system.

The vulnerability exists due to input validation error when processing directory traversal sequences in FileUriConverter of MyFiles. A remote attacker can trick the victim to open a specially crafted archive and overwrite arbitrary files on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise the affected system.


25) Path traversal (CVE-ID: CVE-2024-20805)

The vulnerability allows a remote attacker to overwrite arbitrary files on the system.

The vulnerability exists due to input validation error when processing directory traversal sequences in ZipCompressor of MyFiles. A remote attacker can trick the victim to open a specially crafted archive and overwrite arbitrary files on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise the affected system.


26) Improper access control (CVE-ID: CVE-2024-20802)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper access restrictions in Samsung DeX. A local application can gain unauthorized access to potentially sensitive information.

27) Improper access control (CVE-ID: CVE-2024-20806)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper access restrictions in Notification service. A local application can gain unauthorized access to potentially sensitive information.


28) Heap-based buffer overflow (CVE-ID: CVE-2023-4863)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing WebP images within libwebp library. A remote attacker can trick the victim to visit a malicious website, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system. The vulnerability affects all modern browsers that support WebP image processing.

Note, the vulnerability is being actively exploited in the wild.


29) Reachable Assertion (CVE-ID: CVE-2023-32845)

The vulnerability allows a local application to perform service disruption.

The vulnerability exists due to improper error handling within 5G Modem. A local application can perform service disruption.


30) Reachable Assertion (CVE-ID: CVE-2023-32841)

The vulnerability allows a local application to perform service disruption.

The vulnerability exists due to improper error handling within 5G Modem. A local application can perform service disruption.


31) Information exposure (CVE-ID: CVE-2023-35671)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.


32) Reachable Assertion (CVE-ID: CVE-2023-32846)

The vulnerability allows a local application to perform service disruption.

The vulnerability exists due to improper error handling within 5G Modem. A local application can perform service disruption.


33) Reachable Assertion (CVE-ID: CVE-2023-32844)

The vulnerability allows a local application to perform service disruption.

The vulnerability exists due to improper error handling within 5G Modem. A local application can perform service disruption.


34) Reachable Assertion (CVE-ID: CVE-2023-32842)

The vulnerability allows a local application to perform service disruption.

The vulnerability exists due to improper error handling within 5G Modem. A local application can perform service disruption.


35) Improper input validation (CVE-ID: CVE-2023-40120)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


36) Improper input validation (CVE-ID: CVE-2023-21266)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


37) Information exposure (CVE-ID: CVE-2024-0020)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.


38) Information exposure (CVE-ID: CVE-2024-0017)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.


39) Information exposure (CVE-ID: CVE-2024-0016)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.


40) Buffer overflow (CVE-ID: CVE-2023-33092)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Bluetooth HOST. A local application can execute arbitrary code.


41) Buffer over-read (CVE-ID: CVE-2023-33097)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.


42) Double Free (CVE-ID: CVE-2022-40507)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Core. A local application can execute arbitrary code.


43) Input validation error (CVE-ID: CVE-2023-21164)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


44) Input validation error (CVE-ID: CVE-2023-35690)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


45) Input validation error (CVE-ID: CVE-2023-21263)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to an unspecified vulnerability in Linux kernel. A local user can execute arbitrary code with elevated privileges.


46) Input validation error (CVE-ID: CVE-2023-21402)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


47) Input validation error (CVE-ID: CVE-2023-21401)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to an unspecified vulnerability in Linux kernel. A local user can execute arbitrary code with elevated privileges.


48) Input validation error (CVE-ID: CVE-2023-21217)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


49) Input validation error (CVE-ID: CVE-2023-21162)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


50) Input validation error (CVE-ID: CVE-2023-21163)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


51) Input validation error (CVE-ID: CVE-2023-21166)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


52) Out-of-bounds write (CVE-ID: CVE-2023-32847)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to a missing bounds check within audio. A local application can execute arbitrary code.


53) Input validation error (CVE-ID: CVE-2023-21218)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


54) Use-after-free (CVE-ID: CVE-2023-21216)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error in PowerVR GPU driver. A local user can trigger a use-after-free error and perform a denial of service (DoS) attack.


55) Input validation error (CVE-ID: CVE-2023-21228)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


56) Input validation error (CVE-ID: CVE-2023-21227)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


57) Input validation error (CVE-ID: CVE-2023-21215)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


58) Use-after-free (CVE-ID: CVE-2023-3889)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error caused by improper GPU memory processing operations. A local user can trigger a use-after-free error and execute arbitrary code on the system.


59) Buffer overflow (CVE-ID: CVE-2023-32804)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error in Mali GPU Userspace Driver. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.


60) Use-after-free (CVE-ID: CVE-2023-4272)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error. A local user can gain access to sensitive kernel data.


61) Input validation error (CVE-ID: CVE-2023-21403)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


62) Incorrect Comparison (CVE-ID: CVE-2023-32848)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to type confusion within vdec. A local privileged application can execute arbitrary code.


63) Buffer over-read (CVE-ID: CVE-2023-33080)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.


64) Improper Authentication (CVE-ID: CVE-2023-33054)

The vulnerability allows a remote attacker to read and manipulate data.

The vulnerability exists due to improper input validation in GPS HLOS Driver. A remote attacker can read and manipulate data.


65) NULL Pointer Dereference (CVE-ID: CVE-2023-33088)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in WLAN Firmware. A local application can execute arbitrary code.


66) Buffer over-read (CVE-ID: CVE-2023-33098)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.


67) NULL Pointer Dereference (CVE-ID: CVE-2023-33089)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.


68) Buffer over-read (CVE-ID: CVE-2023-33081)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.


69) Integer overflow (CVE-ID: CVE-2023-33018)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in User Identity Module. A local application can execute arbitrary code.


70) Memory corruption (CVE-ID: CVE-2023-28551)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in UTILS. A local application can execute arbitrary code.


71) Memory corruption (CVE-ID: CVE-2023-28550)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in MPP Performance. A local application can execute arbitrary code.


72) Integer overflow (CVE-ID: CVE-2023-33022)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in HLOS. A local application can execute arbitrary code.


73) Incorrect Calculation of Buffer Size (CVE-ID: CVE-2023-32851)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to a missing bounds check within decoder. A local application can execute arbitrary code.


74) Memory corruption (CVE-ID: CVE-2023-28586)

The vulnerability allows a local privileged application to gain access to sensitive information.

The vulnerability exists due to improper input validation in TZ Secure OS. A local privileged application can gain access to sensitive information.


75) Integer overflow (CVE-ID: CVE-2023-28585)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to improper input validation in TZ Secure OS. A local privileged application can execute arbitrary code.


76) Buffer overflow (CVE-ID: CVE-2023-28546)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in SPS Applications. A local application can execute arbitrary code.


77) Buffer overflow (CVE-ID: CVE-2023-33017)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Boot. A local application can execute arbitrary code.


78) Buffer overflow (CVE-ID: CVE-2023-21662)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Core Platform. A local application can execute arbitrary code.


79) Buffer overflow (CVE-ID: CVE-2023-21664)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Core Platform. A local application can execute arbitrary code.


80) Key Management Errors (CVE-ID: CVE-2023-21652)

The vulnerability allows a local application to read and manipulate data.

The vulnerability exists due to improper input validation in HLOS. A local application can read and manipulate data.


81) Cryptographic Issues (CVE-ID: CVE-2022-22076)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation in Core. A local application can gain access to sensitive information.


Remediation

Install update from vendor's website.