
Cloud Vulnerability DB
A community-led vulnerabilities database
A lack of replay attack protection in Security Mode Command process prior to SMR Oct-2021 Release 1 affects mobile network connections. This vulnerability (CVE-2021-25471) was discovered in Samsung mobile devices running Android versions O(8.1), P(9.0), Q(10.0) with Exynos CP chipsets. The issue was reported on June 27, 2021, and was privately disclosed (Samsung Mobile Security).
The vulnerability stems from insufficient protection against replay attacks in the Security Mode Command process. Without proper replay attack protection mechanisms in place, the system fails to validate the authenticity and freshness of security mode commands. The severity is rated as Moderate, and the vulnerability specifically affects the mobile network connection handling (Samsung Mobile Security).
The exploitation of this vulnerability can lead to denial of service on mobile network connections and battery depletion. This means affected devices could experience disrupted network connectivity and accelerated battery drain when targeted by replay attacks (Samsung Mobile Security).
Samsung addressed this vulnerability in the SMR Oct-2021 Release 1 security update. The patch implements protection against replay attacks by utilizing NAS count verification. Users of affected devices should update their firmware to the latest version that includes this security patch (Samsung Mobile Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."