CVE-2024-46923
Published: 12 February 2025
Summary
CVE-2024-46923 is a high-severity Uncontrolled Resource Consumption (CWE-400) vulnerability in Samsung Exynos 2200 Firmware. Its CVSS base score is 7.5 (High).
Operationally, ranked in the top 34.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the missing null check in the Xclipse Driver's amdgpu_cs_ib_fill function through timely application of Samsung's product security patches.
Provides comprehensive protection against the network-exploitable DoS vulnerability by validating resource requests and limiting consumption in the affected GPU driver.
Mandates input validation, including null checks, for driver functions like amdgpu_cs_ib_fill to prevent uncontrolled resource consumption leading to DoS.
NVD Description
An issue was discovered in Samsung Mobile Processor Exynos 2200, 1480, and 2400. The absence of a null check leads to a Denial of Service at amdgpu_cs_ib_fill in the Xclipse Driver.
Deeper analysisAI
CVE-2024-46923 is a vulnerability affecting the Xclipse Driver in Samsung Mobile Processors Exynos 2200, 1480, and 2400. The issue stems from the absence of a null check in the amdgpu_cs_ib_fill function, which can trigger a Denial of Service condition. It has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and is associated with CWE-400 (Uncontrolled Resource Consumption).
The vulnerability is exploitable remotely over the network by unauthenticated attackers with low attack complexity and no user interaction required. Successful exploitation results in a high-impact denial of service, disrupting system availability without compromising confidentiality or integrity.
Samsung's product security updates, available at https://semiconductor.samsung.com/support/quality-support/product-security-updates/, provide details on patches and mitigation measures for affected Exynos processors.
Details
- CWE(s)