CVE-2024-23350
📋 TL;DR
This vulnerability allows attackers to cause a permanent denial-of-service condition in Qualcomm cellular modems by sending specially crafted NAS transport payloads. It affects devices using Qualcomm chipsets with vulnerable firmware, primarily mobile devices and IoT equipment.
💻 Affected Systems
- Qualcomm Snapdragon chipsets with cellular modems
📦 What is this software?
Snapdragon 8 Gen 3 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Platform Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon X35 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X35 5g Modem Rf System Firmware →
Snapdragon X72 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X72 5g Modem Rf System Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Permanent device bricking requiring hardware replacement or factory reset, rendering the device completely unusable for cellular connectivity.
Likely Case
Temporary loss of cellular connectivity requiring device reboot to restore functionality.
If Mitigated
Minimal impact with proper network filtering and updated firmware preventing exploitation attempts.
🎯 Exploit Status
Exploitation requires sending malformed NAS transport packets via cellular network interface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm August 2024 security bulletin for specific firmware versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html
Restart Required: Yes
Instructions:
1. Check device manufacturer for firmware updates. 2. Apply Qualcomm-provided firmware patches. 3. Reboot device after update.
🔧 Temporary Workarounds
Network traffic filtering
allFilter malformed NAS transport packets at network perimeter
🧯 If You Can't Patch
- Isolate vulnerable devices from untrusted cellular networks
- Implement network monitoring for abnormal NAS transport patterns
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against Qualcomm security bulletin
Check Version:
Device-specific commands vary by manufacturer; typically in Settings > About Phone > Baseband version
Verify Fix Applied:
Verify firmware version has been updated to patched version
📡 Detection & Monitoring
Log Indicators:
- Multiple failed NAS transport integrity checks
- Abnormal LPP status message patterns
Network Indicators:
- Unusual NAS transport packet sequences
- Multiple payloads with SOR container failures
SIEM Query:
Search for cellular modem logs containing 'NAS transport failure' or 'integrity check failed' events