Skip to main content

CVE-2024-53026: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2024-53026cvecve-2024-53026cwe-126
Published: Tue Jun 03 2025 (06/03/2025, 05:52:57 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Information disclosure when an invalid RTCP packet is received during a VoLTE/VoWiFi IMS call.

AI-Powered Analysis

AILast updated: 07/03/2025, 17:43:56 UTC

Technical Analysis

CVE-2024-53026 is a high-severity buffer over-read vulnerability (CWE-126) affecting a broad range of Qualcomm Snapdragon platforms and associated connectivity modules. The vulnerability arises when an invalid Real-time Transport Control Protocol (RTCP) packet is received during a Voice over LTE (VoLTE) or Voice over WiFi (VoWiFi) IP Multimedia Subsystem (IMS) call. Specifically, the flaw allows an attacker to cause the system to read beyond the intended buffer boundaries, leading to information disclosure. This vulnerability does not require any privileges or user interaction to be exploited and can be triggered remotely over the network by sending crafted RTCP packets to a vulnerable device engaged in VoLTE/VoWiFi calls. The affected products include a wide array of Snapdragon mobile platforms, connectivity chips (FastConnect series), modems, automotive platforms, wearable platforms, and video collaboration platforms, covering many generations from older Snapdragon 600/800 series to the latest Snapdragon 8 Gen 3 Mobile Platform. The CVSS v3.1 base score is 8.2, indicating a high severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is primarily on confidentiality, as the buffer over-read can leak sensitive memory content, but it does not affect integrity and only causes low impact on availability. No known exploits are currently reported in the wild, and no patches are linked yet, suggesting that mitigation may rely on vendor firmware updates once available. The vulnerability is significant due to the extensive deployment of Qualcomm Snapdragon chipsets in billions of mobile devices worldwide, including smartphones, IoT devices, automotive systems, and wearables, making the attack surface very large.

Potential Impact

For European organizations, this vulnerability poses a substantial risk due to the widespread use of Qualcomm Snapdragon chipsets in consumer and enterprise mobile devices, many of which are used for secure communications. The information disclosure could lead to leakage of sensitive call data or device memory contents, potentially exposing user credentials, cryptographic keys, or other confidential information. This is particularly critical for sectors relying on secure voice communications over VoLTE/VoWiFi, such as government agencies, financial institutions, healthcare providers, and critical infrastructure operators. The vulnerability could be exploited remotely without user interaction, increasing the risk of targeted espionage or mass surveillance. Additionally, the presence of this flaw in automotive and IoT platforms could impact connected vehicles and industrial control systems, raising safety and privacy concerns. The lack of current known exploits provides a window for mitigation, but the large number of affected devices and the complexity of patch deployment in embedded systems may delay remediation, prolonging exposure.

Mitigation Recommendations

1. Immediate mitigation should focus on network-level protections: deploy intrusion detection/prevention systems (IDS/IPS) capable of inspecting and filtering malformed RTCP packets to block potentially malicious traffic targeting VoLTE/VoWiFi services. 2. Mobile network operators should monitor IMS signaling and RTCP traffic for anomalies indicative of exploitation attempts. 3. Organizations should inventory and identify devices using affected Qualcomm Snapdragon platforms, prioritizing those involved in sensitive communications. 4. Apply firmware and software updates from device manufacturers and Qualcomm as soon as patches become available; coordinate with vendors to accelerate patch deployment, especially for embedded and automotive platforms. 5. For critical environments, consider disabling VoLTE/VoWiFi features temporarily if feasible, or restrict their use to trusted networks. 6. Enhance endpoint security monitoring to detect unusual memory access patterns or information leakage attempts. 7. Educate users and administrators about the risk and encourage vigilance for suspicious call behavior or device anomalies. 8. Collaborate with mobile carriers to ensure secure configuration and timely updates of network infrastructure supporting IMS services.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-11-19T01:01:57.503Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683e92b3182aa0cae267ecad

Added to database: 6/3/2025, 6:14:11 AM

Last enriched: 7/3/2025, 5:43:56 PM

Last updated: 7/10/2025, 2:35:06 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats