Multiple Exynos vulnerabilities allow DoS, code execution
Summary
CERT-Bund issued security advisory WID-SEC-2026-0981 regarding multiple high-severity vulnerabilities in Samsung Exynos chipsets (CVSS Base Score 8.6). Attackers can exploit these vulnerabilities to conduct denial of service attacks and potentially execute arbitrary code remotely. Affected products include Samsung Exynos mobile chipsets and processors.
What changed
CERT-Bund published a security advisory documenting multiple vulnerabilities in Samsung Exynos chipsets that allow remote attackers to perform denial of service attacks and potentially achieve arbitrary code execution. The vulnerabilities carry a CVSS Base Score of 8.6 (high) and a Temporal Score of 7.9 (high), indicating significant risk.
Organizations using Samsung mobile devices or products containing Exynos processors should prioritize identifying affected hardware and implementing security updates from Samsung. The remote attack vector increases the urgency, as adversaries can exploit these vulnerabilities without requiring physical access to devices. Failure to patch may expose systems to compromise and data exfiltration.
What to do next
- Identify devices using Samsung Exynos chipsets
- Apply security patches and firmware updates as released by Samsung
- Monitor CERT-Bund portal for additional updates
Archived snapshot
Apr 7, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
[WID-SEC-2026-0981] Samsung Exynos: Mehrere Schwachstellen CVSS Base Score 8.6 (hoch) CVSS Temporal Score 7.9 (hoch) Remoteangriff ja Datum 06.04.2026 Stand 07.04.2026 Mitigation nein
Betroffene Systeme
Betriebssystem
- Sonstiges
Produktbeschreibung
Exynos ist der Markenname für Samsung-Mobilfunk-Chipsätze und Prozessoren.
Produkte
06.04.2026
- Samsung Exynos
Angriff
Angriff
Ein Angreifer kann mehrere Schwachstellen in Samsung Exynos ausnutzen, um einen Denial of Service Angriff durchzuführen, und potenziell um beliebigen Programmcode auszuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Get daily alerts for CERT-Bund Security Advisories
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.
The plain-English summary, classification, and "what to do next" steps are AI-generated from the original text. Cite the source document, not the AI analysis.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.