CVE-2021-32024

9.8 CRITICAL

📋 TL;DR

This critical vulnerability allows remote attackers to execute arbitrary code by sending specially crafted BMP images to BlackBerry QNX SDP systems. Attackers can potentially take full control of affected systems running QNX SDP versions 6.4 through 7.1. This affects any system using the vulnerable BMP image codec in these QNX versions.

💻 Affected Systems

Products:
  • BlackBerry QNX SDP
Versions: 6.4 to 7.1
Operating Systems: QNX
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the BMP image codec component. Any application or service that processes BMP images using the vulnerable codec is affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to execute arbitrary code with the privileges of the affected process, potentially leading to full system takeover, data exfiltration, or lateral movement within the network.

🟠

Likely Case

Remote code execution leading to service disruption, data theft, or installation of persistent malware on vulnerable QNX systems.

🟢

If Mitigated

Limited impact if systems are properly segmented, have strict input validation, and are not exposed to untrusted BMP image sources.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Remote exploitation requires sending a malicious BMP image to the vulnerable system. No authentication is required if the vulnerable service is exposed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply patches from BlackBerry security advisory KB000089042

Vendor Advisory: http://support.blackberry.com/kb/articleDetail?articleNumber=000089042

Restart Required: Yes

Instructions:

1. Review BlackBerry advisory KB000089042. 2. Download and apply the appropriate patch for your QNX SDP version. 3. Restart affected systems and services. 4. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Disable BMP image processing

all

If BMP image processing is not required, disable or restrict BMP file handling in affected applications.

Network segmentation and filtering

all

Restrict network access to QNX systems and implement strict input validation for image processing services.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate QNX systems from untrusted networks
  • Deploy application-level firewalls to filter and inspect BMP image traffic before it reaches vulnerable systems

🔍 How to Verify

Check if Vulnerable:

Check QNX SDP version using 'uname -a' or system documentation. If version is between 6.4 and 7.1 inclusive, the system is vulnerable.

Check Version:

uname -a

Verify Fix Applied:

Verify patch installation by checking system version and consulting BlackBerry patch documentation. Test BMP image processing functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from image processing services
  • Multiple failed BMP parsing attempts
  • System crashes or restarts of image-related services

Network Indicators:

  • Unusual BMP file transfers to QNX systems
  • Multiple connection attempts to image processing ports
  • Traffic patterns suggesting fuzzing or exploitation attempts

SIEM Query:

source="qnx_systems" AND (event_type="process_creation" OR event_type="service_crash") AND process_name="*image*" OR service_name="*bmp*"

🔗 References

📤 Share & Export