CVE-2025-47371

6.5 MEDIUM

📋 TL;DR

This vulnerability allows a denial-of-service (DoS) attack against LTE user equipment (UE) when it receives an RLC packet with an invalid transport block (TB). Mobile devices using affected Qualcomm chipsets are vulnerable to temporary service disruption.

💻 Affected Systems

Products:
  • Qualcomm LTE modems/chipsets
Versions: Specific versions not publicly detailed; refer to Qualcomm advisory
Operating Systems: Android, other mobile OS using affected chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with vulnerable Qualcomm LTE implementations; exact models require checking Qualcomm's bulletin.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could cause persistent service disruption to mobile devices, preventing voice/data connectivity until device restart or network reattachment.

🟠

Likely Case

Temporary service interruption requiring device reboot or network reconnection to restore functionality.

🟢

If Mitigated

Minimal impact with proper network filtering and updated firmware preventing malicious packets from reaching devices.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specially crafted LTE RLC packets to target devices, typically requiring proximity or network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm March 2026 security bulletin

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2026-bulletin.html

Restart Required: Yes

Instructions:

1. Check device manufacturer for firmware updates. 2. Apply Qualcomm-provided patches via OEM updates. 3. Reboot device after update.

🔧 Temporary Workarounds

Network filtering

all

Implement network-level filtering to block malicious LTE RLC packets

🧯 If You Can't Patch

  • Restrict physical access to prevent local RF-based attacks
  • Monitor for unusual service disruptions and investigate potential attacks

🔍 How to Verify

Check if Vulnerable:

Check device chipset version against Qualcomm advisory; no simple command available

Check Version:

Device-specific (e.g., Android: Settings > About phone > Baseband version)

Verify Fix Applied:

Verify firmware version matches patched version from manufacturer

📡 Detection & Monitoring

Log Indicators:

  • Unexpected LTE RLC protocol errors
  • Frequent radio link failures

Network Indicators:

  • Unusual LTE control plane traffic patterns

SIEM Query:

Search for LTE RLC protocol anomalies or DoS events in mobile network logs

🔗 References

📤 Share & Export