CVE-2024-23350

6.5 MEDIUM

📋 TL;DR

This vulnerability allows attackers to cause a permanent denial-of-service condition in Qualcomm cellular modems by sending specially crafted NAS transport payloads. It affects devices using Qualcomm chipsets with vulnerable firmware, primarily mobile devices and IoT equipment.

💻 Affected Systems

Products:
  • Qualcomm Snapdragon chipsets with cellular modems
Versions: Specific firmware versions not publicly detailed in advisory
Operating Systems: Android and other mobile OS using Qualcomm modems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with vulnerable Qualcomm firmware; exact device models depend on chipset and firmware version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Permanent device bricking requiring hardware replacement or factory reset, rendering the device completely unusable for cellular connectivity.

🟠

Likely Case

Temporary loss of cellular connectivity requiring device reboot to restore functionality.

🟢

If Mitigated

Minimal impact with proper network filtering and updated firmware preventing exploitation attempts.

🌐 Internet-Facing: MEDIUM - Attackers could potentially exploit this remotely via cellular networks, but requires specific knowledge of target's cellular connection.
🏢 Internal Only: LOW - Exploitation would require access to cellular network infrastructure or proximity-based attacks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending malformed NAS transport packets via cellular network interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm August 2024 security bulletin for specific firmware versions

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html

Restart Required: Yes

Instructions:

1. Check device manufacturer for firmware updates. 2. Apply Qualcomm-provided firmware patches. 3. Reboot device after update.

🔧 Temporary Workarounds

Network traffic filtering

all

Filter malformed NAS transport packets at network perimeter

🧯 If You Can't Patch

  • Isolate vulnerable devices from untrusted cellular networks
  • Implement network monitoring for abnormal NAS transport patterns

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Qualcomm security bulletin

Check Version:

Device-specific commands vary by manufacturer; typically in Settings > About Phone > Baseband version

Verify Fix Applied:

Verify firmware version has been updated to patched version

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed NAS transport integrity checks
  • Abnormal LPP status message patterns

Network Indicators:

  • Unusual NAS transport packet sequences
  • Multiple payloads with SOR container failures

SIEM Query:

Search for cellular modem logs containing 'NAS transport failure' or 'integrity check failed' events

🔗 References

📤 Share & Export