CVE-2024-38404

7.5 HIGH

📋 TL;DR

This vulnerability in Qualcomm modems allows a transient denial-of-service (DoS) condition when the device receives a registration accept message with incorrect ciphering key data during over-the-air (OTA) updates. Attackers can temporarily disrupt mobile connectivity by sending specially crafted messages. Affects devices using vulnerable Qualcomm modem chipsets.

💻 Affected Systems

Products:
  • Qualcomm modem chipsets
Versions: Specific versions not publicly detailed; refer to Qualcomm advisory for affected chipsets.
Operating Systems: Android and other mobile OS using Qualcomm modems
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in modem firmware, not application processor. Affects devices when connected to cellular networks.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained DoS attacks could render mobile devices temporarily unable to make/receive calls or use data services until reboot or network re-registration.

🟠

Likely Case

Temporary service disruption lasting seconds to minutes, requiring device to re-establish network connection.

🟢

If Mitigated

Minimal impact with proper network filtering and updated firmware; devices automatically recover.

🌐 Internet-Facing: MEDIUM - Attack requires proximity to target or ability to send malicious OTA messages through cellular network.
🏢 Internal Only: LOW - Primarily affects cellular network interfaces, not internal enterprise networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires ability to send malicious OTA messages via cellular network; no authentication needed but requires proximity or network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to device manufacturer/OEM updates

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html

Restart Required: No

Instructions:

1. Check with device manufacturer for firmware updates. 2. Apply modem firmware patch provided by OEM. 3. No device restart typically required for modem updates.

🔧 Temporary Workarounds

Network filtering

all

Implement network-side filtering of malicious OTA messages at cellular carrier level.

🧯 If You Can't Patch

  • Monitor for unusual network disconnection patterns
  • Implement device management policies to ensure cellular connectivity redundancy

🔍 How to Verify

Check if Vulnerable:

Check device modem firmware version against manufacturer's patched versions list.

Check Version:

Device-specific; typically in Settings > About Phone > Baseband Version

Verify Fix Applied:

Verify modem firmware has been updated to version containing Qualcomm's fix.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected modem resets
  • Frequent network registration failures
  • OTA message parsing errors in modem logs

Network Indicators:

  • Unusual OTA message patterns
  • Spike in network re-registration requests

SIEM Query:

Search for modem crash logs or repeated network attachment failures within short timeframes

🔗 References

📤 Share & Export