CVE-2025-21427

8.2 HIGH

📋 TL;DR

This vulnerability allows information disclosure when a User Equipment (UE) device receives RTP packets from the network. It affects mobile devices with Qualcomm chipsets that process RTP traffic. Attackers could potentially read sensitive data from memory.

💻 Affected Systems

Products:
  • Qualcomm chipsets with RTP processing capabilities
Versions: Specific versions not detailed in reference; check Qualcomm July 2025 bulletin
Operating Systems: Android and other mobile OS using affected Qualcomm components
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with Qualcomm chipsets that process RTP traffic; exact models require checking Qualcomm advisory

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive information from device memory, potentially exposing authentication credentials, personal data, or cryptographic keys.

🟠

Likely Case

Information leakage of non-critical data from RTP packet processing buffers, potentially revealing metadata about communications.

🟢

If Mitigated

Limited exposure of non-sensitive data with proper network segmentation and access controls in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires sending specially crafted RTP packets to target device; network access needed

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Qualcomm July 2025 security bulletin for specific patch versions

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2025-bulletin.html

Restart Required: Yes

Instructions:

1. Check Qualcomm advisory for affected chipset versions. 2. Apply firmware updates from device manufacturer. 3. Reboot device after update.

🔧 Temporary Workarounds

Network filtering

all

Block or filter RTP traffic at network perimeter

Disable vulnerable services

all

Disable RTP processing services if not required

🧯 If You Can't Patch

  • Segment network to restrict RTP traffic to trusted sources only
  • Implement network monitoring for anomalous RTP traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check device chipset version and compare against Qualcomm advisory

Check Version:

Device-specific commands vary; typically in Settings > About Phone > Baseband version

Verify Fix Applied:

Verify firmware version has been updated to patched version

📡 Detection & Monitoring

Log Indicators:

  • Unusual RTP packet processing errors
  • Memory access violations in RTP stack

Network Indicators:

  • Malformed RTP packets targeting devices
  • Unexpected RTP traffic to mobile devices

SIEM Query:

Search for RTP protocol anomalies or memory access violations in device logs

🔗 References

📤 Share & Export