CVE-2024-23385
📋 TL;DR
This vulnerability allows attackers to cause a denial-of-service (DoS) condition in mobile devices by sending specially crafted MAC RAR messages with invalid PDU lengths, triggering a modem reset. It affects mobile devices using Qualcomm modems, potentially impacting cellular connectivity and device functionality.
💻 Affected Systems
- Qualcomm modem chipsets
📦 What is this software?
Smart Audio 200 Platform Firmware by Qualcomm
Snapdragon 208 Processor Firmware by Qualcomm
Snapdragon 210 Processor Firmware by Qualcomm
Snapdragon 212 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 212 Mobile Platform Firmware →
Snapdragon 4 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Platform Firmware →
Snapdragon 425 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 425 Mobile Platform Firmware →
Snapdragon 429 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 429 Mobile Platform Firmware →
Snapdragon 430 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 430 Mobile Platform Firmware →
Snapdragon 439 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 439 Mobile Platform Firmware →
Snapdragon 480 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 480 5g Mobile Platform Firmware →
Snapdragon 480 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 480 5g Mobile Platform Firmware →
Snapdragon 695 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 695 5g Mobile Platform Firmware →
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 3 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Platform Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon Wear 4100\+ Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Wear 4100\+ Platform Firmware →
Snapdragon X35 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X35 5g Modem Rf System Firmware →
Snapdragon X62 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X62 5g Modem Rf System Firmware →
Snapdragon X65 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf System Firmware →
Snapdragon X70 Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X70 Modem Rf System Firmware →
Snapdragon X72 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X72 5g Modem Rf System Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Persistent DoS attacks could render mobile devices temporarily unusable for cellular services, disrupting voice calls, messaging, and data connectivity until manual reboot.
Likely Case
Temporary service disruption causing dropped calls, failed data connections, or brief loss of cellular connectivity until modem automatically recovers.
If Mitigated
Minimal impact with proper network filtering and updated firmware preventing malicious packets from reaching vulnerable devices.
🎯 Exploit Status
Requires ability to send crafted cellular network packets to target device; likely requires proximity or network access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm November 2024 security bulletin for specific patched versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html
Restart Required: Yes
Instructions:
1. Check device manufacturer for firmware updates. 2. Apply Qualcomm modem firmware updates from device OEM. 3. Reboot device after update installation.
🔧 Temporary Workarounds
Network filtering
allImplement network-level filtering to block malicious MAC RAR packets with invalid PDU lengths
🧯 If You Can't Patch
- Implement network monitoring for abnormal MAC RAR traffic patterns
- Restrict physical and network access to cellular interfaces where possible
🔍 How to Verify
Check if Vulnerable:
Check device modem firmware version against Qualcomm security bulletin; contact device manufacturer for vulnerability status
Check Version:
Device-specific commands vary by manufacturer; typically in Settings > About Phone > Baseband Version
Verify Fix Applied:
Verify modem firmware has been updated to version containing November 2024 Qualcomm security patches
📡 Detection & Monitoring
Log Indicators:
- Unexpected modem resets
- MAC RAR processing errors in modem logs
- Abnormal cellular disconnection events
Network Indicators:
- Spike in MAC RAR messages with unusual PDU lengths
- Abnormal cellular signaling patterns
SIEM Query:
Not applicable - requires specialized cellular network monitoring