CVE-2025-52516
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-05

Last updated on: 2026-01-09

Assigner: MITRE

Description
An issue was discovered in the Camera in Samsung Mobile Processor and Wearable Processor Exynos 1330, 1380, 1480, 2400, 1580, 2500. An invalid kernel address dereference in the issimian device driver leads to a denial of service.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-05
Last Modified
2026-01-09
Generated
2026-05-07
AI Q&A
2026-01-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 12 associated CPEs
Vendor Product Version / Range
samsung exynos_1330_firmware *
samsung exynos_1330 *
samsung exynos_1380_firmware *
samsung exynos_1380 *
samsung exynos_1480_firmware *
samsung exynos_1480 *
samsung exynos_1580_firmware *
samsung exynos_1580 *
samsung exynos_2400_firmware *
samsung exynos_2400 *
samsung exynos_2500_firmware *
samsung exynos_2500 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-822 The product obtains a value from an untrusted source, converts this value to a pointer, and dereferences the resulting pointer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a flaw in the issimian device driver, which is part of the camera component in certain Samsung Exynos processors (models 1330, 1380, 1480, 2400, 1580, and 2500). It involves an invalid kernel address dereference that can cause the system to crash or become unresponsive, resulting in a denial of service (DoS). [1]


How can this vulnerability impact me? :

The impact of this vulnerability is a denial of service condition, meaning that affected devices using the specified Samsung Exynos processors could experience crashes or become unresponsive due to the invalid kernel address dereference in the camera driver. This could disrupt normal device operation and availability. [1]


What immediate steps should I take to mitigate this vulnerability?

No specific mitigation steps or patched versions are provided for this vulnerability. Immediate steps cannot be suggested based on the available information. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart