CVE-2023-24848

8.2 HIGH

📋 TL;DR

This vulnerability allows information disclosure in Qualcomm data modems during VoLTE calls when an undefined RTCP FB line value is processed. Attackers could potentially access sensitive information from the modem's memory. Affects devices with Qualcomm chipsets that support VoLTE functionality.

💻 Affected Systems

Products:
  • Qualcomm chipsets with VoLTE support
Versions: Multiple Qualcomm chipset versions prior to October 2023 patches
Operating Systems: Android and other mobile OS using affected Qualcomm chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Requires VoLTE capability and specific chipset models. Check Qualcomm advisory for specific affected chipsets.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker could extract sensitive information from modem memory including call metadata, device identifiers, or potentially authentication credentials.

🟠

Likely Case

Information disclosure of call-related data and potentially device identifiers during VoLTE calls.

🟢

If Mitigated

Limited information exposure with proper network segmentation and VoLTE security controls.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires ability to initiate or intercept VoLTE calls with crafted RTCP packets.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: October 2023 security updates

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin

Restart Required: Yes

Instructions:

1. Check device manufacturer for October 2023 security updates. 2. Apply firmware updates from device manufacturer. 3. Verify Qualcomm chipset firmware is updated.

🔧 Temporary Workarounds

Disable VoLTE

android

Temporarily disable VoLTE functionality to prevent exploitation

Settings > Network & Internet > Mobile network > Preferred network type > Select non-VoLTE option

🧯 If You Can't Patch

  • Implement network monitoring for abnormal RTCP traffic patterns
  • Segment VoLTE traffic and restrict access to vulnerable devices

🔍 How to Verify

Check if Vulnerable:

Check device chipset model and firmware version against Qualcomm's October 2023 advisory

Check Version:

Settings > About phone > Android security patch level

Verify Fix Applied:

Verify device has October 2023 or later security patches installed

📡 Detection & Monitoring

Log Indicators:

  • Abnormal RTCP packet sizes or patterns in modem logs
  • Unexpected memory access patterns in modem diagnostics

Network Indicators:

  • Malformed RTCP packets in VoLTE traffic
  • Unusual RTCP feedback messages

SIEM Query:

RTCP packets with undefined FB line values OR abnormal RTCP packet sizes

🔗 References

📤 Share & Export