CVE-2024-38404
📋 TL;DR
This vulnerability in Qualcomm modems allows a transient denial-of-service (DoS) condition when the device receives a registration accept message with incorrect ciphering key data during over-the-air (OTA) updates. Attackers can temporarily disrupt mobile connectivity by sending specially crafted messages. Affects devices using vulnerable Qualcomm modem chipsets.
💻 Affected Systems
- Qualcomm modem chipsets
📦 What is this software?
Snapdragon 8 Gen 3 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon Wear 4100\+ Firmware by Qualcomm
Snapdragon X72 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X72 5g Modem Rf System Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Sustained DoS attacks could render mobile devices temporarily unable to make/receive calls or use data services until reboot or network re-registration.
Likely Case
Temporary service disruption lasting seconds to minutes, requiring device to re-establish network connection.
If Mitigated
Minimal impact with proper network filtering and updated firmware; devices automatically recover.
🎯 Exploit Status
Requires ability to send malicious OTA messages via cellular network; no authentication needed but requires proximity or network access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to device manufacturer/OEM updates
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html
Restart Required: No
Instructions:
1. Check with device manufacturer for firmware updates. 2. Apply modem firmware patch provided by OEM. 3. No device restart typically required for modem updates.
🔧 Temporary Workarounds
Network filtering
allImplement network-side filtering of malicious OTA messages at cellular carrier level.
🧯 If You Can't Patch
- Monitor for unusual network disconnection patterns
- Implement device management policies to ensure cellular connectivity redundancy
🔍 How to Verify
Check if Vulnerable:
Check device modem firmware version against manufacturer's patched versions list.
Check Version:
Device-specific; typically in Settings > About Phone > Baseband Version
Verify Fix Applied:
Verify modem firmware has been updated to version containing Qualcomm's fix.
📡 Detection & Monitoring
Log Indicators:
- Unexpected modem resets
- Frequent network registration failures
- OTA message parsing errors in modem logs
Network Indicators:
- Unusual OTA message patterns
- Spike in network re-registration requests
SIEM Query:
Search for modem crash logs or repeated network attachment failures within short timeframes