CVE-2024-45552

8.2 HIGH

📋 TL;DR

This vulnerability allows information disclosure during video calls when a device receives a malformed RTCP packet that doesn't conform to RFC standards, causing the device to reset. It affects devices using Qualcomm chipsets with vulnerable video call implementations. Attackers could potentially access sensitive information from the device's memory.

💻 Affected Systems

Products:
  • Qualcomm chipsets with video call capabilities
Versions: Specific versions not publicly detailed in initial advisory
Operating Systems: Android and other mobile OS using Qualcomm chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with video call functionality enabled. Exact product list may be detailed in Qualcomm's security bulletin.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing extraction of sensitive data including call content, authentication tokens, and personal information from device memory.

🟠

Likely Case

Information disclosure of video call metadata, partial call content, or device state information during the reset process.

🟢

If Mitigated

Minimal impact with proper network segmentation and updated firmware preventing packet processing.

🌐 Internet-Facing: HIGH - Video call services are typically internet-facing and RTCP packets can be sent remotely.
🏢 Internal Only: MEDIUM - Internal video conferencing systems could be targeted by internal actors.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires sending specially crafted RTCP packets to target device during video call. No public exploit code available at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm April 2025 security bulletin for specific patched versions

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2025-bulletin.html

Restart Required: Yes

Instructions:

1. Check Qualcomm security bulletin for affected chipset versions. 2. Contact device manufacturer for firmware updates. 3. Apply manufacturer-provided security patches. 4. Reboot device after update.

🔧 Temporary Workarounds

Network filtering for RTCP packets

all

Implement network filtering to block or inspect RTCP packets from untrusted sources

Disable video calls from untrusted networks

all

Restrict video call functionality to trusted networks only

🧯 If You Can't Patch

  • Segment video conferencing traffic to isolated network segments
  • Implement strict firewall rules to limit RTCP traffic to trusted sources only

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Qualcomm's security bulletin. No simple command available without manufacturer tools.

Check Version:

Device-specific commands vary by manufacturer (e.g., Android: Settings > About phone > Build number)

Verify Fix Applied:

Verify firmware version matches patched versions listed in Qualcomm security bulletin

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device resets during video calls
  • RTCP protocol errors in network logs
  • Video call service crashes

Network Indicators:

  • Malformed RTCP packets to video call ports
  • Unusual RTCP traffic patterns

SIEM Query:

search 'device_reset' OR 'rtcp_error' OR 'video_call_crash' within video conferencing application logs

🔗 References

📤 Share & Export