Auto-Update: 2024-11-06T05:00:19.479746+00:00

This commit is contained in:
cad-safe-bot 2024-11-06 05:03:19 +00:00
parent 79c44872bc
commit c7c8dcbae5
21 changed files with 879 additions and 6 deletions

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-34673",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-11-06T03:15:03.257",
"lastModified": "2024-11-06T03:15:03.257",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Input Validation in IpcProtocol in Modem prior to SMR Nov-2024 Release 1 allows local attackers to cause Denial-of-Service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=11",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-34674",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-11-06T03:15:03.473",
"lastModified": "2024-11-06T03:15:03.473",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in Contacts prior to SMR Nov-2024 Release 1 allows physical attackers to access data across multiple user profiles."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=11",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-34675",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-11-06T03:15:03.643",
"lastModified": "2024-11-06T03:15:03.643",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in Dex Mode prior to SMR Nov-2024 Release 1 allows physical attackers to temporarily access to unlocked screen."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.4,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=11",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-34676",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-11-06T03:15:03.820",
"lastModified": "2024-11-06T03:15:03.820",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds write in parsing subtitle file in libsubextractor.so prior to SMR Nov-2024 Release 1 allows local attackers to cause memory corruption. User interaction is required for triggering this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=11",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-34677",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-11-06T03:15:03.980",
"lastModified": "2024-11-06T03:15:03.980",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Exposure of sensitive information in System UI prior to SMR Nov-2024 Release 1 allow local attackers to make malicious apps appear as legitimate."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=11",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-34678",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-11-06T03:15:04.153",
"lastModified": "2024-11-06T03:15:04.153",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds write in libsapeextractor.so prior to SMR Nov-2024 Release 1 allows local attackers to cause memory corruption."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=11",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-34679",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-11-06T03:15:04.317",
"lastModified": "2024-11-06T03:15:04.317",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect default permissions in Crane prior to SMR Nov-2024 Release 1 allows local attackers to access files with phone privilege."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=11",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-34680",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-11-06T03:15:04.477",
"lastModified": "2024-11-06T03:15:04.477",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use of implicit intent for sensitive communication in WlanTest prior to SMR Nov-2024 Release 1 allows local attackers to get sensitive information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=11",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-34681",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-11-06T03:15:04.643",
"lastModified": "2024-11-06T03:15:04.643",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in BluetoothAdapter prior to SMR Nov-2024 Release 1 allows local attackers to cause local permanent denial of service on Galaxy Watch."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 4.7
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=11",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-34682",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-11-06T03:15:04.807",
"lastModified": "2024-11-06T03:15:04.807",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper authorization in Settings prior to SMR Nov-2024 Release 1 allows physical attackers to access stored WiFi password in Maintenance Mode."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.4,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=11",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-49401",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-11-06T03:15:04.973",
"lastModified": "2024-11-06T03:15:04.973",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in Settings Suggestions prior to SMR Nov-2024 Release 1 allows local attackers to launch privileged activities."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=11",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-49402",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-11-06T03:15:05.153",
"lastModified": "2024-11-06T03:15:05.153",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in Dressroom prior to SMR Nov-2024 Release 1 allow physical attackers to access data across multiple user profiles."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=11",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-49403",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-11-06T03:15:05.323",
"lastModified": "2024-11-06T03:15:05.323",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in Samsung Voice Recorder prior to version 21.5.40.37 allows physical attackers to access recording files on the lock screen."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=11",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-49404",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-11-06T03:15:05.490",
"lastModified": "2024-11-06T03:15:05.490",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Access Control in Samsung Video Player prior to versions 7.3.29.1 in Android 12, 7.3.36.1 in Android 13, and 7.3.41.230 in Android 14 allows physical attackers to access video file of other users."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=11",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-49405",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-11-06T03:15:05.660",
"lastModified": "2024-11-06T03:15:05.660",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper authentication in Private Info in Samsung Pass in prior to version 4.4.04.7 allows physical attackers to access sensitive information in a specific scenario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 4.0
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=11",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-49406",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-11-06T03:15:05.833",
"lastModified": "2024-11-06T03:15:05.833",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper validation of integrity check value in Blockchain Keystore prior to version 1.3.16 allows local attackers to modify transaction. Root privilege is required for triggering this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=11",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-49407",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-11-06T03:15:05.990",
"lastModified": "2024-11-06T03:15:05.990",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in Samsung Flow prior to version 4.9.15.7 allows physical attackers to access data across multiple user profiles."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=11",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-49408",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-11-06T03:15:06.157",
"lastModified": "2024-11-06T03:15:06.157",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds write in usb driver prior to Firmware update Sep-2024 Release on Galaxy S24 allows local attackers to write out-of-bounds memory. System privilege is required for triggering this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=09",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-49409",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-11-06T03:15:06.317",
"lastModified": "2024-11-06T03:15:06.317",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds write in Battery Full Capacity node prior to Firmware update Sep-2024 Release on Galaxy S24 allows local attackers to write out-of-bounds memory. System privilege is required for triggering this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=09",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-11-06T03:00:19.714583+00:00
2024-11-06T05:00:19.479746+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-11-06T02:15:15.930000+00:00
2024-11-06T03:15:06.317000+00:00
```
### Last Data Feed Release
@ -33,14 +33,32 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
268399
268418
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `19`
- [CVE-2024-10647](CVE-2024/CVE-2024-106xx/CVE-2024-10647.json) (`2024-11-06T02:15:15.930`)
- [CVE-2024-34673](CVE-2024/CVE-2024-346xx/CVE-2024-34673.json) (`2024-11-06T03:15:03.257`)
- [CVE-2024-34674](CVE-2024/CVE-2024-346xx/CVE-2024-34674.json) (`2024-11-06T03:15:03.473`)
- [CVE-2024-34675](CVE-2024/CVE-2024-346xx/CVE-2024-34675.json) (`2024-11-06T03:15:03.643`)
- [CVE-2024-34676](CVE-2024/CVE-2024-346xx/CVE-2024-34676.json) (`2024-11-06T03:15:03.820`)
- [CVE-2024-34677](CVE-2024/CVE-2024-346xx/CVE-2024-34677.json) (`2024-11-06T03:15:03.980`)
- [CVE-2024-34678](CVE-2024/CVE-2024-346xx/CVE-2024-34678.json) (`2024-11-06T03:15:04.153`)
- [CVE-2024-34679](CVE-2024/CVE-2024-346xx/CVE-2024-34679.json) (`2024-11-06T03:15:04.317`)
- [CVE-2024-34680](CVE-2024/CVE-2024-346xx/CVE-2024-34680.json) (`2024-11-06T03:15:04.477`)
- [CVE-2024-34681](CVE-2024/CVE-2024-346xx/CVE-2024-34681.json) (`2024-11-06T03:15:04.643`)
- [CVE-2024-34682](CVE-2024/CVE-2024-346xx/CVE-2024-34682.json) (`2024-11-06T03:15:04.807`)
- [CVE-2024-49401](CVE-2024/CVE-2024-494xx/CVE-2024-49401.json) (`2024-11-06T03:15:04.973`)
- [CVE-2024-49402](CVE-2024/CVE-2024-494xx/CVE-2024-49402.json) (`2024-11-06T03:15:05.153`)
- [CVE-2024-49403](CVE-2024/CVE-2024-494xx/CVE-2024-49403.json) (`2024-11-06T03:15:05.323`)
- [CVE-2024-49404](CVE-2024/CVE-2024-494xx/CVE-2024-49404.json) (`2024-11-06T03:15:05.490`)
- [CVE-2024-49405](CVE-2024/CVE-2024-494xx/CVE-2024-49405.json) (`2024-11-06T03:15:05.660`)
- [CVE-2024-49406](CVE-2024/CVE-2024-494xx/CVE-2024-49406.json) (`2024-11-06T03:15:05.833`)
- [CVE-2024-49407](CVE-2024/CVE-2024-494xx/CVE-2024-49407.json) (`2024-11-06T03:15:05.990`)
- [CVE-2024-49408](CVE-2024/CVE-2024-494xx/CVE-2024-49408.json) (`2024-11-06T03:15:06.157`)
- [CVE-2024-49409](CVE-2024/CVE-2024-494xx/CVE-2024-49409.json) (`2024-11-06T03:15:06.317`)
### CVEs modified in the last Commit

View File

@ -242727,7 +242727,7 @@ CVE-2024-1062,0,0,96fd163b87faa7f96df00eff21b1688e595dd6d409735135ea0e59da2984f8
CVE-2024-10620,0,0,724abc136e85c83fb378f9f08553f42597c7003f31982d5ab3f2f979a65abde0,2024-11-01T12:57:03.417000
CVE-2024-1063,0,0,74a897918202555ab7dea6b1737e329d32a036051a3381cf0244644b537611c7,2024-02-05T18:25:57.167000
CVE-2024-1064,0,0,f25346ba7587521e1585b34f9b82a63a0a8099891451ea7215e7704632eec54a,2024-02-12T18:42:14.777000
CVE-2024-10647,1,1,330e63a034c2276e9293e58a5787ca23da5b71ee3d45423fc1f3e32b5c62be9a,2024-11-06T02:15:15.930000
CVE-2024-10647,0,0,330e63a034c2276e9293e58a5787ca23da5b71ee3d45423fc1f3e32b5c62be9a,2024-11-06T02:15:15.930000
CVE-2024-1065,0,0,6b929e111558868b0121ca43ebc298de03b6cbdcab98142e875670ec0e17e759,2024-07-03T01:44:57.727000
CVE-2024-10651,0,0,4020d234a4dc20eeefa40d62db04df21d3fc130e9d8122bd0290808c2b4b15c0,2024-11-01T12:57:03.417000
CVE-2024-10652,0,0,e78eb78c66337c771ed734884436ae7db011d1841627efa41acd490150897405,2024-11-01T12:57:03.417000
@ -254517,7 +254517,17 @@ CVE-2024-3467,0,0,cacb4fff60c492ce28d24c855ee87196a20d1b51cff8acadb6d43f71f0e4e4
CVE-2024-34670,0,0,c7f7a5e478bc1a10ace61979abf21c947b061684824f9606c72fa122e8a61c6e,2024-10-10T12:57:21.987000
CVE-2024-34671,0,0,a08598303b7cc44bc7ce36474bf6973e3d3c57f08611bad7aa18ef971deedc26,2024-10-10T12:57:21.987000
CVE-2024-34672,0,0,5b999fcfa370bba972f9e6370e3179075f4c5c678a82b2140b4d119a0d64c655,2024-10-10T12:56:30.817000
CVE-2024-34673,1,1,955e7fdcf466d883b33c569efd41a03913b34266aa94c856b1dda8f742171c2c,2024-11-06T03:15:03.257000
CVE-2024-34674,1,1,4233c6de2743e86ade719bea8b2789408ca5055fa389399e597306f6076b9c6e,2024-11-06T03:15:03.473000
CVE-2024-34675,1,1,388297320e6976125e80eee9943e59b47d113044d97ca69252ef439d63032e00,2024-11-06T03:15:03.643000
CVE-2024-34676,1,1,1a3666d1632dca93cbec6d6636b6a9e9b447a9e8a969e50c5ca197e5efe3630d,2024-11-06T03:15:03.820000
CVE-2024-34677,1,1,e4b674fe72ad8e998c3fc1626177aa8713e1dce066119c7416b9be6db31d0ee0,2024-11-06T03:15:03.980000
CVE-2024-34678,1,1,f2d70aae83c64552081a79c35b1e5473e40076d3a00219f12fb3fbe3302833b7,2024-11-06T03:15:04.153000
CVE-2024-34679,1,1,1847dc0a8bc7208fb1324afbc997fd0c9f68ceb89cbcb2c4dda97d339e1a6293,2024-11-06T03:15:04.317000
CVE-2024-3468,0,0,b143f709020bfa0c4d31a3d3e75dcacae5f0344d8dcf22b8e7a02c60ed5e45e0,2024-06-13T18:36:09.010000
CVE-2024-34680,1,1,e95da3d998f7f18d9c903c5ee91d80269afae3bcea766a756737985e6e7b6854,2024-11-06T03:15:04.477000
CVE-2024-34681,1,1,735785311d8ec8ec643d9f93b4f6ab3bed0cc0cbdc5dfe3600cd77ed0baddc28,2024-11-06T03:15:04.643000
CVE-2024-34682,1,1,b9f85269f913754abd1dcdb31cc10e762dd6b0f5bf741762cb45e44af03bdc4c,2024-11-06T03:15:04.807000
CVE-2024-34683,0,0,9d29c0ceca80aeb9ddf34072d48291a9d5d5d5decac1bcbe5defe30bff14c867,2024-08-09T20:04:44.060000
CVE-2024-34684,0,0,e8c75614bfdf726402b2e2e5ba5b4d9d3d56d8e0e55be88a08ea86e305e764ec,2024-08-09T19:15:17.677000
CVE-2024-34685,0,0,7b2238e6c0d6ba01f5b0c43be9387a7356e22cab609b2b92ef07aa910b7a9a4c,2024-08-29T19:29:14.440000
@ -263805,6 +263815,15 @@ CVE-2024-49398,0,0,1964f2918f2b62a12a26449777ec3d512771c9e0a90e6a92142f1221cf2a6
CVE-2024-49399,0,0,280599d675596d0a62f92142e8a452afef09a7da5cc6b00dfa86815a1f9a12f9,2024-10-18T12:52:33.507000
CVE-2024-4940,0,0,4accffc853c801fe14d0f801549945291e8d9583e559383dea39b767fc7e6ff0,2024-06-24T12:57:36.513000
CVE-2024-49400,0,0,4447b6d98624a8004ac0954b08a6ad26989e2084cf92d73c9f3d9262ea896967,2024-11-01T19:35:28.673000
CVE-2024-49401,1,1,27cafe6619f5c73e23dc8ce64897e729d0bfbda66d53b9fcef1e409b2786e52e,2024-11-06T03:15:04.973000
CVE-2024-49402,1,1,d053aef3b40e6722dc221818b4854eacf474aabc3799e20c248c7589a779e252,2024-11-06T03:15:05.153000
CVE-2024-49403,1,1,7f5d28940f2f7a7bd6b84dd19e0ee7a2d5d278c6787e8ea0dde19716e9369f4c,2024-11-06T03:15:05.323000
CVE-2024-49404,1,1,547948f2505deb9536c38a1e82cf743518dc101d479a60b5d8b5e2c32afcd00c,2024-11-06T03:15:05.490000
CVE-2024-49405,1,1,ef6d2c414b509cb1cf9fb9c1fb3d5ca65beddce401850bcb770f5173bba8838e,2024-11-06T03:15:05.660000
CVE-2024-49406,1,1,1181b5d2d0cb02836dbbe3453cc05ba2b40b063516afd66d324b47d7949d9d55,2024-11-06T03:15:05.833000
CVE-2024-49407,1,1,cf66f32ff5ad0708e8b1aecc488cb8eca2bcbe4acfa9ad5106ce2534a1cf609c,2024-11-06T03:15:05.990000
CVE-2024-49408,1,1,9238b36a8fe372c1fc512139341356dc980443dcb0b6402fa1e5868c7d7a37db,2024-11-06T03:15:06.157000
CVE-2024-49409,1,1,2846c26bacb06dcc30c4dc5bfe74f68b4fc87876fa3c6fa86a09c75a900b56c6,2024-11-06T03:15:06.317000
CVE-2024-4941,0,0,4a44b53eeef21b9bcc4a70f0f12e019011a282ac818fbf5410cd9bce445ce09d,2024-10-09T16:24:24.433000
CVE-2024-4942,0,0,ec40ecb2c6f2c92030124cf4a899658443926a41ec90982de736f0fdfba6bcb7,2024-07-23T21:09:15.900000
CVE-2024-4943,0,0,c3255ca69e7d3076031772cbfca36198fc76d9c4ad7b4e1b0b2d1944b2bfd408,2024-05-21T12:37:59.687000

Can't render this file because it is too large.