Skip to main content

CVE-2024-53021: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2024-53021cvecve-2024-53021cwe-126
Published: Tue Jun 03 2025 (06/03/2025, 05:52:55 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Information disclosure may occur while processing goodbye RTCP packet from network.

AI-Powered Analysis

AILast updated: 07/03/2025, 17:44:13 UTC

Technical Analysis

CVE-2024-53021 is a high-severity buffer over-read vulnerability (CWE-126) affecting a broad range of Qualcomm Snapdragon platforms and related wireless connectivity products. The vulnerability arises during the processing of goodbye RTCP (Real-time Transport Control Protocol) packets received from the network. Specifically, the flaw allows an attacker to cause the system to read beyond the intended buffer boundaries, potentially leading to information disclosure. This vulnerability does not require any privileges or user interaction to be exploited, and it can be triggered remotely over the network (AV:N/AC:L/PR:N/UI:N). The affected products include numerous Snapdragon mobile platforms, FastConnect wireless subsystems, Qualcomm modem and connectivity chipsets, and various specialized platforms such as robotics and video collaboration systems. The CVSS v3.1 base score is 8.2, indicating a high severity level, with a strong impact on confidentiality (C:H), no impact on integrity (I:N), and low impact on availability (A:L). The vulnerability is currently published with no known exploits in the wild and no publicly available patches at the time of reporting. Given the extensive list of affected platforms, this vulnerability potentially impacts a wide range of consumer and enterprise devices, including smartphones, IoT devices, embedded systems, and wireless communication infrastructure that utilize Qualcomm Snapdragon chipsets or related components. The vulnerability's exploitation could allow attackers to extract sensitive information from device memory, which may include cryptographic keys, user data, or other confidential information processed by the affected components. Since the flaw is triggered by network packets, it could be exploited by attackers within wireless network range or via compromised network infrastructure. The lack of required authentication and user interaction increases the risk profile, making it a critical concern for device manufacturers, service providers, and end users relying on Qualcomm Snapdragon-based devices.

Potential Impact

For European organizations, the impact of CVE-2024-53021 is significant due to the widespread use of Qualcomm Snapdragon chipsets in mobile devices, IoT deployments, and wireless communication equipment across the region. Confidentiality breaches resulting from this vulnerability could lead to unauthorized disclosure of sensitive corporate data, user credentials, or intellectual property. Enterprises relying on mobile workforce devices or embedded systems with affected Snapdragon platforms may face risks of data leakage or espionage. Telecommunications providers and network operators using Qualcomm-based infrastructure components could experience exposure of network management or subscriber information. Additionally, sectors such as finance, healthcare, and critical infrastructure that depend on secure mobile communications and IoT devices may be particularly vulnerable. The vulnerability's remote exploitability without user interaction increases the likelihood of targeted attacks or mass exploitation campaigns. Although no known exploits are currently reported, the high severity and broad device impact necessitate urgent attention to prevent potential compromise and data breaches within European organizations.

Mitigation Recommendations

Given the absence of publicly available patches at the time of disclosure, European organizations should implement a multi-layered mitigation approach. First, monitor Qualcomm and device manufacturers for timely security updates and apply patches as soon as they become available. In the interim, network-level mitigations can reduce exposure: deploy intrusion detection and prevention systems (IDS/IPS) to monitor and block suspicious RTCP traffic, especially malformed goodbye RTCP packets. Network segmentation and strict access controls should limit exposure of vulnerable devices to untrusted networks. Organizations should also enforce strong wireless network security protocols (e.g., WPA3) to reduce the risk of unauthorized network access. Device inventory and asset management processes must identify all affected Qualcomm Snapdragon-based devices to prioritize risk assessment and remediation. For critical systems, consider temporary disabling or restricting RTCP traffic if feasible without impacting essential services. Additionally, implement endpoint detection and response (EDR) solutions to detect anomalous behaviors indicative of exploitation attempts. Finally, raise user and administrator awareness about the vulnerability and encourage reporting of unusual device or network activity.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-11-19T01:01:57.501Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683e92b3182aa0cae267ecab

Added to database: 6/3/2025, 6:14:11 AM

Last enriched: 7/3/2025, 5:44:13 PM

Last updated: 7/14/2025, 4:26:46 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats