CVE-2024-45552
📋 TL;DR
This vulnerability allows information disclosure during video calls when a device receives a malformed RTCP packet that doesn't conform to RFC standards, causing the device to reset. It affects devices using Qualcomm chipsets with vulnerable video call implementations. Attackers could potentially access sensitive information from the device's memory.
💻 Affected Systems
- Qualcomm chipsets with video call capabilities
📦 What is this software?
Qualcomm 205 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Qualcomm 205 Mobile Platform Firmware →
Qualcomm 215 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Qualcomm 215 Mobile Platform Firmware →
Smart Audio 200 Platform Firmware by Qualcomm
Smart Display 200 Platform \(apq5053 Aa\) Firmware by Qualcomm
View all CVEs affecting Smart Display 200 Platform \(apq5053 Aa\) Firmware →
Snapdragon 208 Processor Firmware by Qualcomm
Snapdragon 210 Processor Firmware by Qualcomm
Snapdragon 212 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 212 Mobile Platform Firmware →
Snapdragon 4 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Platform Firmware →
Snapdragon 429 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 429 Mobile Platform Firmware →
Snapdragon 460 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 460 Mobile Platform Firmware →
Snapdragon 480 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 480 5g Mobile Platform Firmware →
Snapdragon 480\+ 5g Mobile Platform \(sm4350 Ac\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 480\+ 5g Mobile Platform \(sm4350 Ac\) Firmware →
Snapdragon 625 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 625 Mobile Platform Firmware →
Snapdragon 626 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 626 Mobile Platform Firmware →
Snapdragon 660 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 660 Mobile Platform Firmware →
Snapdragon 662 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 662 Mobile Platform Firmware →
Snapdragon 680 4g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 680 4g Mobile Platform Firmware →
Snapdragon 685 4g Mobile Platform \(sm6225 Ad\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 685 4g Mobile Platform \(sm6225 Ad\) Firmware →
Snapdragon 695 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 695 5g Mobile Platform Firmware →
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 3 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Platform Firmware →
Snapdragon 820 Automotive Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 820 Automotive Platform Firmware →
Snapdragon 835 Mobile Pc Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 835 Mobile Pc Platform Firmware →
Snapdragon 845 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 845 Mobile Platform Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 865\+ 5g Mobile Platform \(sm8250 Ab\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 865\+ 5g Mobile Platform \(sm8250 Ab\) Firmware →
Snapdragon 870 5g Mobile Platform \(sm8250 Ac\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 870 5g Mobile Platform \(sm8250 Ac\) Firmware →
Snapdragon W5\+ Gen 1 Wearable Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon W5\+ Gen 1 Wearable Platform Firmware →
Snapdragon Wear 2100 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Wear 2100 Platform Firmware →
Snapdragon Wear 2500 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Wear 2500 Platform Firmware →
Snapdragon Wear 3100 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Wear 3100 Platform Firmware →
Snapdragon X55 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf System Firmware →
Snapdragon Xr1 Platform Firmware by Qualcomm
Snapdragon Xr2 5g Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Xr2 5g Platform Firmware →
Video Collaboration Vc1 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc1 Platform Firmware →
Video Collaboration Vc3 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc3 Platform Firmware →
Vision Intelligence 100 Platform \(apq8053 Aa\) Firmware by Qualcomm
View all CVEs affecting Vision Intelligence 100 Platform \(apq8053 Aa\) Firmware →
Vision Intelligence 200 Platform \(apq8053 Ac\) Firmware by Qualcomm
View all CVEs affecting Vision Intelligence 200 Platform \(apq8053 Ac\) Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise allowing extraction of sensitive data including call content, authentication tokens, and personal information from device memory.
Likely Case
Information disclosure of video call metadata, partial call content, or device state information during the reset process.
If Mitigated
Minimal impact with proper network segmentation and updated firmware preventing packet processing.
🎯 Exploit Status
Requires sending specially crafted RTCP packets to target device during video call. No public exploit code available at time of analysis.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm April 2025 security bulletin for specific patched versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2025-bulletin.html
Restart Required: Yes
Instructions:
1. Check Qualcomm security bulletin for affected chipset versions. 2. Contact device manufacturer for firmware updates. 3. Apply manufacturer-provided security patches. 4. Reboot device after update.
🔧 Temporary Workarounds
Network filtering for RTCP packets
allImplement network filtering to block or inspect RTCP packets from untrusted sources
Disable video calls from untrusted networks
allRestrict video call functionality to trusted networks only
🧯 If You Can't Patch
- Segment video conferencing traffic to isolated network segments
- Implement strict firewall rules to limit RTCP traffic to trusted sources only
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against Qualcomm's security bulletin. No simple command available without manufacturer tools.
Check Version:
Device-specific commands vary by manufacturer (e.g., Android: Settings > About phone > Build number)
Verify Fix Applied:
Verify firmware version matches patched versions listed in Qualcomm security bulletin
📡 Detection & Monitoring
Log Indicators:
- Unexpected device resets during video calls
- RTCP protocol errors in network logs
- Video call service crashes
Network Indicators:
- Malformed RTCP packets to video call ports
- Unusual RTCP traffic patterns
SIEM Query:
search 'device_reset' OR 'rtcp_error' OR 'video_call_crash' within video conferencing application logs