CVE-2025-27034

9.8 CRITICAL

📋 TL;DR

This vulnerability allows memory corruption during PLMN selection from the SOR failed list in Qualcomm chipsets, potentially enabling remote code execution. It affects devices using vulnerable Qualcomm modem/baseband firmware. Attackers could exploit this to gain control over affected mobile devices.

💻 Affected Systems

Products:
  • Qualcomm chipsets with cellular modem functionality
Versions: Specific firmware versions listed in Qualcomm September 2025 security bulletin
Operating Systems: Android, other mobile OS using Qualcomm chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with vulnerable Qualcomm modem/baseband firmware; exact device models depend on OEM implementation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with kernel/system privileges leading to complete device compromise, data theft, and persistent backdoor installation.

🟠

Likely Case

Device crash/reboot (DoS) or limited code execution in modem/baseband context, potentially enabling interception of cellular communications.

🟢

If Mitigated

Device remains stable with no exploitation due to network segmentation and proper security controls.

🌐 Internet-Facing: HIGH - Exploitable via cellular network protocols without user interaction.
🏢 Internal Only: LOW - Requires cellular network access; not exploitable via internal enterprise networks alone.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires cellular network access and knowledge of modem/baseband internals; CVSS 9.8 suggests high exploitability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware updates specified in Qualcomm September 2025 security bulletin

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2025-bulletin.html

Restart Required: Yes

Instructions:

1. Check Qualcomm advisory for affected chipset/firmware versions. 2. Contact device OEM for firmware updates. 3. Apply firmware update via OEM-provided method. 4. Reboot device after update.

🔧 Temporary Workarounds

Disable vulnerable cellular features

all

Disable automatic network selection and use manual network mode if supported

Network segmentation

all

Restrict cellular network access to trusted carriers only

🧯 If You Can't Patch

  • Isolate affected devices from critical networks and sensitive data
  • Implement network monitoring for unusual cellular traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check device modem/baseband firmware version against Qualcomm advisory; use Android commands like 'getprop | grep version.baseband' or device-specific OEM tools.

Check Version:

Android: 'getprop | grep version.baseband' or OEM-specific diagnostic tools

Verify Fix Applied:

Verify modem/baseband firmware version matches patched version from OEM update; check for absence of crashes in modem logs.

📡 Detection & Monitoring

Log Indicators:

  • Modem/baseband crash logs
  • Unexpected PLMN selection failures
  • Memory corruption errors in modem logs

Network Indicators:

  • Unusual cellular network signaling patterns
  • Anomalous PLMN selection attempts

SIEM Query:

Search for modem crash events, baseband errors, or PLMN selection anomalies in device logs

🔗 References

📤 Share & Export