CVE-2024-46922
Published: 12 February 2025
Summary
CVE-2024-46922 is a high-severity NULL Pointer Dereference (CWE-476) vulnerability in Samsung Exynos 1480 Firmware. Its CVSS base score is 7.5 (High).
Operationally, ranked in the top 26.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-11 (Error Handling).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-2 mandates timely identification, reporting, and remediation of flaws such as the null pointer dereference in the Xclipse Driver, directly preventing DoS exploitation via patches.
SI-11 requires error and exception handling that avoids compromising availability, directly addressing the crash caused by unhandled null dereference in amdgpu_cs_parser_bos.
SI-10 enforces validation of information inputs to the driver parser function, mitigating the absence of null pointer checks that enable remote DoS.
NVD Description
An issue was discovered in Samsung Mobile Processor Exynos 1480 and 2400. The absence of a null check leads to a Denial of Service at amdgpu_cs_parser_bos in the Xclipse Driver.
Deeper analysisAI
CVE-2024-46922 is a vulnerability affecting Samsung Mobile Processor Exynos 1480 and 2400 chips, stemming from the absence of a null pointer check in the amdgpu_cs_parser_bos function within the Xclipse Driver. This flaw, classified under CWE-476 (NULL Pointer Dereference), was publicly disclosed on February 12, 2025, and carries a CVSS v3.1 base score of 7.5, indicating high severity primarily due to its potential for disruption.
Remote attackers require no privileges or user interaction to exploit this issue over the network with low attack complexity. Successful exploitation triggers a denial-of-service condition by crashing the affected driver component, resulting in high availability impact without compromising confidentiality or integrity.
Samsung has published details on this vulnerability through its product security updates portal at https://semiconductor.samsung.com/support/quality-support/product-security-updates/, where practitioners can find guidance on applicable patches or mitigations for affected Exynos-based devices.
Details
- CWE(s)