Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-54982: n/a

0
High
VulnerabilityCVE-2024-54982cvecve-2024-54982
Published: Thu Dec 19 2024 (12/19/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-54982 is a vulnerability in the Quectel BC25 chipset firmware version BC25PAR01A06 that allows attackers to bypass authentication by sending a specially crafted NAS message. The issue is reportedly rooted in the chipset supply chain rather than isolated to specific Quectel products, according to Quectel. No CVSS score has been assigned yet, and there are no known exploits in the wild. This vulnerability could allow unauthorized access to cellular network functions, potentially impacting device security and network integrity. The lack of patches and the chipset-level nature of the flaw complicate mitigation efforts. Organizations using devices with affected Quectel BC25 chipsets should be vigilant and monitor for updates. The threat is particularly relevant to industries relying on IoT and cellular communications. Countries with significant deployments of Quectel BC25-based devices and critical cellular infrastructure are at higher risk. Due to the authentication bypass and potential broad impact, the severity is assessed as high.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:59:32 UTC

Technical Analysis

CVE-2024-54982 identifies a security vulnerability in the Quectel BC25 cellular module firmware version BC25PAR01A06. The flaw allows an attacker to bypass authentication mechanisms by crafting and sending a malicious NAS (Non-Access Stratum) message, which is part of the LTE cellular protocol stack responsible for signaling between the device and the network core. This bypass could enable unauthorized commands or access to cellular network functions, undermining device and network security. Quectel has disputed the characterization of this issue as localized to their products, stating it originates from the chipset supply chain, implying the vulnerability may affect multiple devices and manufacturers using this chipset. No CVSS score has been assigned, and no public exploits have been reported, suggesting limited current exploitation but a significant latent risk. The chipset-level nature means firmware updates or hardware replacements may be necessary, complicating mitigation. The vulnerability impacts the confidentiality and integrity of cellular communications and could lead to unauthorized network access or control. Given the widespread use of Quectel BC25 modules in IoT devices, industrial equipment, and communication devices, the scope of affected systems is broad. The ease of exploitation depends on attacker access to the cellular signaling interface, which may be remotely feasible. No user interaction is required, and authentication is bypassed, increasing risk severity.

Potential Impact

The vulnerability could allow attackers to bypass authentication controls in cellular modules, potentially gaining unauthorized access to network functions or device controls. This could lead to interception or manipulation of data, unauthorized device control, or disruption of cellular communications. For organizations, this threatens the confidentiality and integrity of sensitive communications and may enable further attacks on network infrastructure or connected systems. The impact is particularly severe for industries relying on IoT devices, critical infrastructure, and cellular-based communications, such as utilities, transportation, and manufacturing. The chipset-level flaw means many devices across different vendors could be affected, increasing the attack surface. Additionally, the difficulty in patching embedded firmware in deployed devices could prolong exposure. While no exploits are known currently, the potential for exploitation exists, especially by sophisticated threat actors targeting cellular networks or critical infrastructure. This could result in operational disruptions, data breaches, or loss of control over critical systems.

Mitigation Recommendations

Organizations should first identify all devices using the Quectel BC25 chipset with the affected firmware version BC25PAR01A06. Engage with device manufacturers and suppliers to confirm the presence of the vulnerability and inquire about firmware updates or hardware revisions. Implement network-level monitoring for anomalous NAS message traffic that could indicate exploitation attempts. Employ cellular network security controls such as network access control, anomaly detection, and segmentation to limit exposure. Where possible, isolate critical devices from untrusted networks or restrict cellular interfaces to trusted networks only. Consider deploying additional authentication or encryption layers at the application level to mitigate risks from lower-layer vulnerabilities. Maintain close coordination with cellular network providers to monitor for suspicious activity. Plan for long-term remediation, including firmware updates or device replacement, as chipset-level vulnerabilities are difficult to patch remotely. Finally, keep abreast of advisories from Quectel, chipset vendors, and security communities for updates or patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-12-06T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699f6bcab7ef31ef0b55af2f

Added to database: 2/25/2026, 9:38:18 PM

Last enriched: 2/26/2026, 1:59:32 AM

Last updated: 2/26/2026, 9:35:21 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats