Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-54982: n/a

0
Unknown
VulnerabilityCVE-2024-54982cvecve-2024-54982
Published: Thu Dec 19 2024 (12/19/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in Quectel BC25 with firmware version BC25PAR01A06 allows attackers to bypass authentication via a crafted NAS message. NOTE: Quectel disputes this because the issue is in the chipset supply chain and is not localized to one or more Quectel products.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 01:59:32 UTC

Technical Analysis

CVE-2024-54982 identifies a security vulnerability in the Quectel BC25 cellular module firmware version BC25PAR01A06. The flaw allows an attacker to bypass authentication mechanisms by crafting and sending a malicious NAS (Non-Access Stratum) message, which is part of the LTE cellular protocol stack responsible for signaling between the device and the network core. This bypass could enable unauthorized commands or access to cellular network functions, undermining device and network security. Quectel has disputed the characterization of this issue as localized to their products, stating it originates from the chipset supply chain, implying the vulnerability may affect multiple devices and manufacturers using this chipset. No CVSS score has been assigned, and no public exploits have been reported, suggesting limited current exploitation but a significant latent risk. The chipset-level nature means firmware updates or hardware replacements may be necessary, complicating mitigation. The vulnerability impacts the confidentiality and integrity of cellular communications and could lead to unauthorized network access or control. Given the widespread use of Quectel BC25 modules in IoT devices, industrial equipment, and communication devices, the scope of affected systems is broad. The ease of exploitation depends on attacker access to the cellular signaling interface, which may be remotely feasible. No user interaction is required, and authentication is bypassed, increasing risk severity.

Potential Impact

The vulnerability could allow attackers to bypass authentication controls in cellular modules, potentially gaining unauthorized access to network functions or device controls. This could lead to interception or manipulation of data, unauthorized device control, or disruption of cellular communications. For organizations, this threatens the confidentiality and integrity of sensitive communications and may enable further attacks on network infrastructure or connected systems. The impact is particularly severe for industries relying on IoT devices, critical infrastructure, and cellular-based communications, such as utilities, transportation, and manufacturing. The chipset-level flaw means many devices across different vendors could be affected, increasing the attack surface. Additionally, the difficulty in patching embedded firmware in deployed devices could prolong exposure. While no exploits are known currently, the potential for exploitation exists, especially by sophisticated threat actors targeting cellular networks or critical infrastructure. This could result in operational disruptions, data breaches, or loss of control over critical systems.

Mitigation Recommendations

Organizations should first identify all devices using the Quectel BC25 chipset with the affected firmware version BC25PAR01A06. Engage with device manufacturers and suppliers to confirm the presence of the vulnerability and inquire about firmware updates or hardware revisions. Implement network-level monitoring for anomalous NAS message traffic that could indicate exploitation attempts. Employ cellular network security controls such as network access control, anomaly detection, and segmentation to limit exposure. Where possible, isolate critical devices from untrusted networks or restrict cellular interfaces to trusted networks only. Consider deploying additional authentication or encryption layers at the application level to mitigate risks from lower-layer vulnerabilities. Maintain close coordination with cellular network providers to monitor for suspicious activity. Plan for long-term remediation, including firmware updates or device replacement, as chipset-level vulnerabilities are difficult to patch remotely. Finally, keep abreast of advisories from Quectel, chipset vendors, and security communities for updates or patches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-12-06T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699f6bcab7ef31ef0b55af2f

Added to database: 2/25/2026, 9:38:18 PM

Last enriched: 2/26/2026, 1:59:32 AM

Last updated: 4/12/2026, 3:38:59 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses