CVE-2024-21454

7.5 HIGH

📋 TL;DR

This vulnerability in Automotive Telematics systems allows attackers to cause a Denial of Service (DoS) by sending specially crafted messages that trigger excessive resource consumption during decoding. It affects vehicles and automotive systems using Qualcomm telematics components. The vulnerability is triggered when processing ToBeSignedMessage data.

💻 Affected Systems

Products:
  • Qualcomm Automotive Telematics Systems
  • Vehicles with Qualcomm telematics modules
Versions: Specific versions not publicly detailed in bulletin; affected versions are those referenced in Qualcomm's April 2024 security bulletin.
Operating Systems: Embedded automotive systems using Qualcomm chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with vulnerable Qualcomm telematics firmware. Exact product models and versions require checking Qualcomm's security bulletin.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of telematics services including emergency calling, navigation, and vehicle connectivity functions, potentially affecting safety-critical systems.

🟠

Likely Case

Temporary loss of telematics connectivity and services until system restart or recovery, impacting infotainment and remote monitoring capabilities.

🟢

If Mitigated

Minimal impact with proper message validation and resource limits in place, potentially causing only brief service interruptions.

🌐 Internet-Facing: MEDIUM - Telematics systems often have external connectivity but may have layered network protections.
🏢 Internal Only: LOW - Primarily affects automotive systems with limited internal network exposure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending malformed messages to the telematics system, which may be accessible via cellular or local network interfaces.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm's April 2024 security bulletin for specific patched versions

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2024-bulletin.html

Restart Required: Yes

Instructions:

1. Check Qualcomm's April 2024 security bulletin for affected products
2. Contact vehicle manufacturer or telematics provider for firmware updates
3. Apply firmware updates following manufacturer instructions
4. Restart telematics system after update

🔧 Temporary Workarounds

Network Segmentation

all

Isolate telematics systems from untrusted networks to limit attack surface

Message Validation

all

Implement input validation for telematics message processing

🧯 If You Can't Patch

  • Implement network monitoring for unusual telematics traffic patterns
  • Deploy rate limiting on telematics message processing

🔍 How to Verify

Check if Vulnerable:

Check firmware version against Qualcomm's security bulletin and contact vehicle/telematics manufacturer

Check Version:

Manufacturer-specific command; typically requires diagnostic tools or manufacturer interface

Verify Fix Applied:

Verify firmware version has been updated to patched version specified by manufacturer

📡 Detection & Monitoring

Log Indicators:

  • Unusual telematics message processing errors
  • System resource exhaustion alerts
  • Repeated telematics service restarts

Network Indicators:

  • Unusual volume of telematics messages
  • Malformed message patterns to telematics ports

SIEM Query:

source="telematics" AND (error="resource_exhaustion" OR error="decode_failure")

🔗 References

📤 Share & Export