CVE-2025-21452
📋 TL;DR
This vulnerability allows attackers to cause a denial-of-service (DoS) condition on LTE networks by sending specially crafted random-access response (RAR) messages with invalid PDU lengths. It affects mobile network infrastructure equipment and devices using Qualcomm LTE modems/chipsets. The attack disrupts network availability but doesn't compromise data confidentiality or integrity.
💻 Affected Systems
- Qualcomm LTE modems
- Mobile devices with Qualcomm chipsets
- LTE network infrastructure equipment
📦 What is this software?
Snapdragon 4 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Platform Firmware →
Snapdragon 480 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 480 5g Mobile Platform Firmware →
Snapdragon 480\+ 5g Mobile Platform \(sm4350 Ac\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 480\+ 5g Mobile Platform \(sm4350 Ac\) Firmware →
Snapdragon 690 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 690 5g Mobile Platform Firmware →
Snapdragon 695 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 695 5g Mobile Platform Firmware →
Snapdragon 765 5g Mobile Platform \(sm7250 Aa\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 765 5g Mobile Platform \(sm7250 Aa\) Firmware →
Snapdragon 765g 5g Mobile Platform \(sm7250 Ab\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 765g 5g Mobile Platform \(sm7250 Ab\) Firmware →
Snapdragon 768g 5g Mobile Platform \(sm7250 Ac\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 768g 5g Mobile Platform \(sm7250 Ac\) Firmware →
Snapdragon 778g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Platform Firmware →
Snapdragon 778g\+ 5g Mobile Platform \(sm7325 Ae\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g\+ 5g Mobile Platform \(sm7325 Ae\) Firmware →
Snapdragon 780g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 780g 5g Mobile Platform Firmware →
Snapdragon 782g Mobile Platform \(sm7325 Af\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 782g Mobile Platform \(sm7325 Af\) Firmware →
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon 855 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 855 Mobile Platform Firmware →
Snapdragon 855\+\/860 Mobile Platform \(sm8150 Ac\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 855\+\/860 Mobile Platform \(sm8150 Ac\) Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 865\+ 5g Mobile Platform \(sm8250 Ab\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 865\+ 5g Mobile Platform \(sm8250 Ab\) Firmware →
Snapdragon 870 5g Mobile Platform \(sm8250 Ac\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 870 5g Mobile Platform \(sm8250 Ac\) Firmware →
Snapdragon 888 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 888 5g Mobile Platform Firmware →
Snapdragon 888\+ 5g Mobile Platform \(sm8350 Ac\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 888\+ 5g Mobile Platform \(sm8350 Ac\) Firmware →
Snapdragon Auto 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Firmware →
Snapdragon X35 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X35 5g Modem Rf System Firmware →
Snapdragon X55 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf System Firmware →
Snapdragon Xr2 5g Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Xr2 5g Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Sustained DoS affecting multiple base stations or network segments, disrupting mobile service for large geographic areas.
Likely Case
Temporary service disruption affecting individual cells or devices, causing dropped connections and degraded network performance.
If Mitigated
Minimal impact with proper network segmentation and monitoring; isolated incidents quickly detected and contained.
🎯 Exploit Status
Exploitation requires LTE protocol knowledge and radio transmission capability; no authentication needed as it targets network signaling.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm August 2025 security bulletin for specific firmware versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html
Restart Required: Yes
Instructions:
1. Check Qualcomm advisory for affected products. 2. Obtain updated firmware from device manufacturer or carrier. 3. Apply firmware update following vendor instructions. 4. Reboot affected devices/systems.
🔧 Temporary Workarounds
Network monitoring and filtering
allImplement network monitoring to detect anomalous RAR traffic and filter suspicious messages
🧯 If You Can't Patch
- Implement network segmentation to limit blast radius of DoS attacks
- Deploy redundant systems with failover capabilities to maintain service during attacks
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against Qualcomm's patched versions list in the August 2025 bulletin
Check Version:
Device-specific; typically via AT commands or device management interfaces (e.g., AT+CGMR for modems)
Verify Fix Applied:
Verify firmware version matches or exceeds patched version specified by Qualcomm
📡 Detection & Monitoring
Log Indicators:
- Unexpected baseband resets
- Increased RAR processing errors
- Abnormal LTE signaling messages
Network Indicators:
- Spike in RAR messages with unusual lengths
- Increased radio link failures
- Abnormal cell reselection patterns
SIEM Query:
Example: 'source="lte_logs" AND (message="RAR length error" OR message="PDU validation failed")'