{"api_version":"1","generated_at":"2026-04-23T03:26:20+00:00","cve":"CVE-2023-28613","urls":{"html":"https://cve.report/CVE-2023-28613","api":"https://cve.report/api/cve/CVE-2023-28613.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-28613","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-28613"},"summary":{"title":"CVE-2023-28613","description":"An issue was discovered in Samsung Exynos Mobile Processor and Baseband Modem Processor for Exynos 1280, Exynos 2200, and Exynos Modem 5300. An integer overflow in IPv4 fragment handling can occur due to insufficient parameter validation when reassembling these fragments.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2023-04-04 16:15:00","updated_at":"2023-05-05 19:15:00"},"problem_types":["CWE-190"],"metrics":[],"references":[{"url":"https://semiconductor.samsung.com/support/quality-support/product-security-updates/","name":"https://semiconductor.samsung.com/support/quality-support/product-security-updates/","refsource":"MISC","tags":[],"title":"Product Security Update | Support | Samsung Semiconductor Global","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://semiconductor.samsung.com/processor/modem/","name":"https://semiconductor.samsung.com/processor/modem/","refsource":"MISC","tags":[],"title":"Modem | Processor | Samsung Semiconductor Global","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://packetstormsecurity.com/files/172177/Shannon-Baseband-Integer-Overflow.html","name":"http://packetstormsecurity.com/files/172177/Shannon-Baseband-Integer-Overflow.html","refsource":"MISC","tags":[],"title":"Shannon Baseband Integer Overflow ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://semiconductor.samsung.com/processor/mobile-processor/","name":"https://semiconductor.samsung.com/processor/mobile-processor/","refsource":"MISC","tags":[],"title":"Exynos Mobile Processor | Samsung Semiconductor Global","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-28613","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28613","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"28613","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"samsung","cpe5":"exynos_1280","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"28613","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"samsung","cpe5":"exynos_1280_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"28613","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"samsung","cpe5":"exynos_2200","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"28613","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"samsung","cpe5":"exynos_2200_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"28613","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"samsung","cpe5":"exynos_modem_5300","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"28613","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"samsung","cpe5":"exynos_modem_5300_firmware","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-28613","qid":"610482","title":"Google Pixel Android April 2023 Security Patch Missing"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2023-28613","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in Samsung Exynos Mobile Processor and Baseband Modem Processor for Exynos 1280, Exynos 2200, and Exynos Modem 5300. An integer overflow in IPv4 fragment handling can occur due to insufficient parameter validation when reassembling these fragments."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://semiconductor.samsung.com/processor/modem/","refsource":"MISC","name":"https://semiconductor.samsung.com/processor/modem/"},{"url":"https://semiconductor.samsung.com/processor/mobile-processor/","refsource":"MISC","name":"https://semiconductor.samsung.com/processor/mobile-processor/"},{"refsource":"MISC","name":"https://semiconductor.samsung.com/support/quality-support/product-security-updates/","url":"https://semiconductor.samsung.com/support/quality-support/product-security-updates/"},{"refsource":"MISC","name":"http://packetstormsecurity.com/files/172177/Shannon-Baseband-Integer-Overflow.html","url":"http://packetstormsecurity.com/files/172177/Shannon-Baseband-Integer-Overflow.html"}]},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AC:H/AV:N/A:H/C:N/I:N/PR:N/S:C/UI:N","version":"3.1"}}},"nvd":{"publishedDate":"2023-04-04 16:15:00","lastModifiedDate":"2023-05-05 19:15:00","problem_types":["CWE-190"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:samsung:exynos_1280_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:samsung:exynos_2200_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:samsung:exynos_modem_5300_firmware:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:samsung:exynos_modem_5300:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":null,"notes":[]}}}