Skip to main content

CVE-2024-53020: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2024-53020cvecve-2024-53020cwe-126
Published: Tue Jun 03 2025 (06/03/2025, 05:52:54 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Information disclosure may occur while decoding the RTP packet with invalid header extension from network.

AI-Powered Analysis

AILast updated: 07/03/2025, 17:54:36 UTC

Technical Analysis

CVE-2024-53020 is a high-severity buffer over-read vulnerability (CWE-126) found in various Qualcomm Snapdragon platforms and associated wireless connectivity modules. The flaw occurs during the decoding of RTP (Real-time Transport Protocol) packets that contain invalid header extensions received from the network. Specifically, when the RTP packet header extension is malformed or crafted maliciously, the decoding process reads beyond the allocated buffer boundaries, leading to an information disclosure condition. This vulnerability affects a broad range of Qualcomm products, including numerous Snapdragon mobile platforms (from Snapdragon 210 up to Snapdragon 8 Gen 3), FastConnect wireless subsystems, and various Qualcomm connectivity chips (QCA, QCM, QCS series), as well as automotive, wearable, and video collaboration platforms. The vulnerability does not require user interaction or privileges to exploit and can be triggered remotely over the network (AV:N/AC:L/PR:N/UI:N). The CVSS v3.1 base score is 8.2, reflecting a high impact on confidentiality with no impact on integrity and a low impact on availability. Exploitation could allow an attacker to leak sensitive information from memory, potentially aiding further attacks or reconnaissance. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was publicly disclosed in June 2025, with the initial reservation in November 2024.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily through mobile devices, IoT, automotive systems, and enterprise equipment that incorporate affected Qualcomm Snapdragon chipsets or connectivity modules. Since Snapdragon platforms are widely used in smartphones, tablets, automotive infotainment systems, and industrial IoT devices, the potential for information leakage could expose sensitive corporate or personal data, including cryptographic keys, credentials, or proprietary information. The remote and unauthenticated nature of the exploit increases the attack surface, especially in environments where devices are connected to untrusted or public networks. Critical sectors such as telecommunications, automotive manufacturing, healthcare, and finance in Europe could be impacted due to their reliance on mobile and embedded systems using these chipsets. Additionally, the vulnerability could be leveraged as a stepping stone for more sophisticated attacks by adversaries targeting European enterprises or government entities. The broad product range affected means that many devices in use across Europe could be vulnerable, increasing the urgency for mitigation.

Mitigation Recommendations

Given the absence of official patches at the time of disclosure, European organizations should take proactive and layered mitigation steps: 1) Inventory and identify all devices and embedded systems using affected Qualcomm Snapdragon platforms and connectivity modules within their environment. 2) Apply any available firmware or software updates from device manufacturers or Qualcomm as soon as they are released. 3) Employ network-level protections such as RTP packet inspection and filtering to detect and block malformed RTP packets with invalid header extensions, using advanced intrusion detection/prevention systems (IDS/IPS) capable of RTP protocol analysis. 4) Segment and isolate critical systems and IoT devices to limit exposure to untrusted networks, especially those that rely on vulnerable chipsets. 5) Monitor network traffic for unusual RTP activity or signs of exploitation attempts. 6) Engage with device vendors and service providers to prioritize updates and confirm remediation status. 7) For automotive and industrial systems, coordinate with suppliers to ensure timely firmware updates and consider compensating controls such as enhanced network segmentation and anomaly detection. These steps go beyond generic patching advice by emphasizing network-level controls and asset management tailored to the affected Qualcomm platforms.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-11-19T01:01:57.501Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683e92b3182aa0cae267eca9

Added to database: 6/3/2025, 6:14:11 AM

Last enriched: 7/3/2025, 5:54:36 PM

Last updated: 8/15/2025, 9:47:28 AM

Views: 23

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats