CVE-2024-23362

7.1 HIGH

📋 TL;DR

This vulnerability involves a cryptographic issue in RSA key parsing in COBR format, potentially allowing attackers to bypass cryptographic protections or cause denial of service. It affects systems using Qualcomm components that process RSA keys in COBR format. The impact depends on how the vulnerable component is integrated into the system.

💻 Affected Systems

Products:
  • Qualcomm chipsets and components
Versions: Specific versions listed in Qualcomm September 2024 security bulletin
Operating Systems: Android and other OS using Qualcomm components
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems using RSA keys in COBR format; impact varies by implementation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of cryptographic protections, allowing decryption of sensitive data, authentication bypass, or system compromise.

🟠

Likely Case

Denial of service through malformed key processing or potential cryptographic bypass in specific configurations.

🟢

If Mitigated

Limited impact if proper input validation and cryptographic controls are implemented at higher layers.

🌐 Internet-Facing: MEDIUM - Could affect internet-facing services using vulnerable cryptographic implementations, but requires specific conditions.
🏢 Internal Only: LOW - Primarily affects internal cryptographic operations; less exposure to external attackers.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to supply malformed RSA keys; complexity depends on system configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions specified in Qualcomm September 2024 security bulletin

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html

Restart Required: Yes

Instructions:

1. Check Qualcomm advisory for affected components. 2. Apply firmware/software updates from device manufacturer. 3. Reboot affected devices. 4. Verify update installation.

🔧 Temporary Workarounds

Input validation for RSA keys

all

Implement strict validation of RSA keys before processing

Disable COBR format support

all

If possible, disable support for COBR format RSA keys

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable systems
  • Monitor for anomalous cryptographic operations or key processing errors

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Qualcomm advisory; examine cryptographic library versions

Check Version:

Device-specific commands (e.g., 'getprop ro.build.fingerprint' for Android)

Verify Fix Applied:

Verify firmware/software version matches patched versions in advisory; test RSA key processing

📡 Detection & Monitoring

Log Indicators:

  • Cryptographic library errors
  • RSA key parsing failures
  • Unexpected key format rejections

Network Indicators:

  • Unusual cryptographic handshake failures
  • Anomalous key exchange patterns

SIEM Query:

Search for cryptographic error logs containing 'RSA', 'COBR', or 'key parsing'

🔗 References

📤 Share & Export