CVE-2024-23358
📋 TL;DR
This vulnerability in Qualcomm modems allows a transient denial-of-service (DoS) condition when the device receives a registration accept OTA (Over-The-Air) message with incorrect ciphering key data. Attackers can send specially crafted messages to crash or disrupt modem functionality. This affects devices using vulnerable Qualcomm modem chipsets.
💻 Affected Systems
- Qualcomm modem chipsets
📦 What is this software?
Smart Audio 200 Platform Firmware by Qualcomm
Snapdragon 208 Processor Firmware by Qualcomm
Snapdragon 210 Processor Firmware by Qualcomm
Snapdragon 212 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 212 Mobile Platform Firmware →
Snapdragon 425 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 425 Mobile Platform Firmware →
Snapdragon 429 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 429 Mobile Platform Firmware →
Snapdragon 430 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 430 Mobile Platform Firmware →
Snapdragon 439 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 439 Mobile Platform Firmware →
Snapdragon 8 Gen 3 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Platform Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon Wear 4100\+ Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Wear 4100\+ Platform Firmware →
Snapdragon X72 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X72 5g Modem Rf System Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Permanent modem failure requiring device reboot or factory reset, disrupting all cellular connectivity including emergency calls.
Likely Case
Temporary loss of cellular connectivity (transient DoS) until modem recovers or device reboots.
If Mitigated
Minimal impact with proper network filtering and updated firmware.
🎯 Exploit Status
Exploitation requires sending specially crafted OTA messages over cellular network. No public exploit code available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to September 2024 Qualcomm security bulletin for specific patched versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html
Restart Required: Yes
Instructions:
1. Check with device manufacturer for firmware updates. 2. Apply Qualcomm-provided modem firmware patches. 3. Reboot device after update.
🔧 Temporary Workarounds
Network filtering
allImplement network-level filtering of malformed OTA messages
Airplane mode toggle
allTemporarily disable cellular radio when not needed
🧯 If You Can't Patch
- Limit device exposure to untrusted cellular networks
- Monitor for unusual modem crashes or connectivity issues
🔍 How to Verify
Check if Vulnerable:
Check device modem firmware version against Qualcomm security bulletin
Check Version:
Device-specific commands vary by manufacturer (e.g., Android: Settings > About Phone > Baseband version)
Verify Fix Applied:
Verify modem firmware has been updated to patched version
📡 Detection & Monitoring
Log Indicators:
- Modem crash logs
- Unexpected modem resets
- Cellular connectivity loss events
Network Indicators:
- Unusual OTA message patterns
- Malformed registration accept messages
SIEM Query:
Search for modem crash events or cellular service disruption logs