CVE-2024-23352

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to cause a denial of service (DoS) in NAS (Network Access Stratum) implementations by sending specially crafted ODAC criteria in registration accept OTA messages. It affects Qualcomm mobile devices and infrastructure equipment using vulnerable NAS implementations. The attack causes temporary service disruption rather than permanent damage.

💻 Affected Systems

Products:
  • Qualcomm mobile platforms
  • Qualcomm modem chipsets
  • Cellular network infrastructure using Qualcomm components
Versions: Specific versions not publicly disclosed; refer to Qualcomm August 2024 security bulletin
Operating Systems: Android, Embedded RTOS on modem chips
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices when connected to cellular networks; Wi-Fi only devices not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption for affected mobile devices, preventing voice calls, messaging, and data services until system recovery.

🟠

Likely Case

Temporary service interruption for individual devices or small groups of devices, requiring device reboot or network reconnection.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring; service restored automatically after timeout.

🌐 Internet-Facing: MEDIUM - Attack requires proximity to target or ability to send OTA messages to cellular infrastructure.
🏢 Internal Only: LOW - Primarily affects cellular network infrastructure rather than internal enterprise systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires ability to send OTA messages to cellular infrastructure, which typically requires specialized equipment or network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm August 2024 security bulletin for specific patched versions

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html

Restart Required: Yes

Instructions:

1. Check Qualcomm security bulletin for affected components. 2. Obtain firmware updates from device manufacturer. 3. Apply updates following manufacturer instructions. 4. Reboot affected devices.

🔧 Temporary Workarounds

Network filtering

all

Implement network filtering to block malformed ODAC criteria at network perimeter

Monitoring and alerting

all

Monitor for unusual registration patterns and implement alerting for potential DoS attempts

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable systems
  • Deploy intrusion detection systems to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Qualcomm security bulletin; devices with unpatched Qualcomm components are vulnerable

Check Version:

Device-specific commands vary by manufacturer; typically in Settings > About Phone > Software Information

Verify Fix Applied:

Verify firmware version has been updated to patched version specified in Qualcomm bulletin

📡 Detection & Monitoring

Log Indicators:

  • Unusual registration failures
  • Multiple registration attempts with malformed parameters
  • NAS layer error messages

Network Indicators:

  • Abnormal OTA message patterns
  • Registration accept messages with ODAC criteria of length 1 and type 1

SIEM Query:

Search for NAS registration errors or abnormal cellular network authentication patterns

🔗 References

📤 Share & Export