CVE-2024-21454
📋 TL;DR
This vulnerability in Automotive Telematics systems allows attackers to cause a Denial of Service (DoS) by sending specially crafted messages that trigger excessive resource consumption during decoding. It affects vehicles and automotive systems using Qualcomm telematics components. The vulnerability is triggered when processing ToBeSignedMessage data.
💻 Affected Systems
- Qualcomm Automotive Telematics Systems
- Vehicles with Qualcomm telematics modules
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete disruption of telematics services including emergency calling, navigation, and vehicle connectivity functions, potentially affecting safety-critical systems.
Likely Case
Temporary loss of telematics connectivity and services until system restart or recovery, impacting infotainment and remote monitoring capabilities.
If Mitigated
Minimal impact with proper message validation and resource limits in place, potentially causing only brief service interruptions.
🎯 Exploit Status
Exploitation requires sending malformed messages to the telematics system, which may be accessible via cellular or local network interfaces.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm's April 2024 security bulletin for specific patched versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2024-bulletin.html
Restart Required: Yes
Instructions:
1. Check Qualcomm's April 2024 security bulletin for affected products
2. Contact vehicle manufacturer or telematics provider for firmware updates
3. Apply firmware updates following manufacturer instructions
4. Restart telematics system after update
🔧 Temporary Workarounds
Network Segmentation
allIsolate telematics systems from untrusted networks to limit attack surface
Message Validation
allImplement input validation for telematics message processing
🧯 If You Can't Patch
- Implement network monitoring for unusual telematics traffic patterns
- Deploy rate limiting on telematics message processing
🔍 How to Verify
Check if Vulnerable:
Check firmware version against Qualcomm's security bulletin and contact vehicle/telematics manufacturer
Check Version:
Manufacturer-specific command; typically requires diagnostic tools or manufacturer interface
Verify Fix Applied:
Verify firmware version has been updated to patched version specified by manufacturer
📡 Detection & Monitoring
Log Indicators:
- Unusual telematics message processing errors
- System resource exhaustion alerts
- Repeated telematics service restarts
Network Indicators:
- Unusual volume of telematics messages
- Malformed message patterns to telematics ports
SIEM Query:
source="telematics" AND (error="resource_exhaustion" OR error="decode_failure")