CVE-2024-54983

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass authentication on Quectel BC95-CNV cellular modules by sending specially crafted NAS (Non-Access Stratum) messages. This affects IoT devices and systems using these modules for NB-IoT connectivity, potentially allowing unauthorized access to device functionality.

💻 Affected Systems

Products:
  • Quectel BC95-CNV
Versions: V100R001C00SPC051
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices using the vulnerable firmware version in NB-IoT deployments.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to intercept communications, inject malicious commands, or disable critical IoT infrastructure.

🟠

Likely Case

Unauthorized access to device management functions, data interception, or service disruption for affected IoT deployments.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict network segmentation and monitoring.

🌐 Internet-Facing: HIGH - IoT devices are often directly internet-accessible with minimal network protection.
🏢 Internal Only: MEDIUM - Risk exists but can be mitigated with proper network segmentation and monitoring.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public GitHub repository contains proof-of-concept demonstrating the authentication bypass via crafted NAS messages.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: Yes

Instructions:

1. Contact Quectel support for firmware updates. 2. Check vendor website for security advisories. 3. Apply firmware update following vendor instructions.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices in separate network segments with strict firewall rules.

Traffic Filtering

all

Block or filter NAS protocol messages at network perimeter.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable devices
  • Deploy network monitoring and intrusion detection for NAS protocol anomalies

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via AT+CGMR command or device management interface.

Check Version:

AT+CGMR

Verify Fix Applied:

Verify firmware version has been updated beyond V100R001C00SPC051.

📡 Detection & Monitoring

Log Indicators:

  • Unusual NAS message patterns
  • Authentication failures followed by successful access
  • Unexpected device reboots or resets

Network Indicators:

  • Anomalous NAS protocol traffic
  • Unexpected connections to device management interfaces
  • Traffic from unexpected sources to NB-IoT devices

SIEM Query:

source="nbiot-devices" AND (protocol="nas" AND size>normal) OR (auth_failure AND immediate_success)

🔗 References

📤 Share & Export