CVE-2024-54984: n/a
CVE-2024-54984 is a critical vulnerability in the Quectel BG96 cellular module that allows attackers to bypass authentication by sending a crafted NAS message. This flaw can lead to full compromise of confidentiality, integrity, and availability without requiring any privileges or user interaction. Although the supplier disputes the issue, the CVSS score of 9. 8 indicates a severe risk. No patches are currently available, and no known exploits have been observed in the wild. The vulnerability relates to improper authentication controls (CWE-306) in the module's handling of NAS protocol messages. Organizations using Quectel BG96 modules in IoT or M2M devices should urgently assess exposure and implement network-level mitigations. Countries with significant deployments of Quectel modules, especially in telecom and industrial sectors, face the highest risk.
AI Analysis
Technical Summary
CVE-2024-54984 identifies a critical authentication bypass vulnerability in the Quectel BG96 cellular module, specifically the BG96MAR02A08M1G firmware. The flaw arises from improper validation of NAS (Non-Access Stratum) protocol messages, which are used for signaling between the cellular device and the network core. An attacker capable of sending a specially crafted NAS message can bypass the module's authentication mechanisms, effectively gaining unauthorized access to the device's cellular functions. This can lead to full compromise of the device's confidentiality, integrity, and availability, as the attacker can manipulate or disrupt cellular communications. The vulnerability is notable for requiring no privileges or user interaction, and it can be exploited remotely over the network. Despite the supplier disputing the vulnerability, the CVSS 3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reflects the high severity and ease of exploitation. No patches or firmware updates have been publicly released, and no active exploits have been reported in the wild. The issue is categorized under CWE-306, indicating missing or insufficient authentication controls. The vulnerability poses a significant risk to IoT, M2M, and embedded systems that rely on Quectel BG96 modules for cellular connectivity, potentially allowing attackers to intercept, manipulate, or disrupt communications and data flows.
Potential Impact
The impact of CVE-2024-54984 is severe for organizations deploying Quectel BG96 modules in their IoT, M2M, or embedded device fleets. Successful exploitation can lead to complete compromise of device communications, enabling attackers to intercept sensitive data, inject malicious commands, disrupt service availability, or pivot into internal networks. This threatens confidentiality, integrity, and availability of critical systems, especially in industrial automation, smart metering, transportation, and telecommunications infrastructure. The lack of required privileges or user interaction lowers the barrier for attackers, increasing the likelihood of exploitation once the vulnerability is known. The absence of patches means organizations remain exposed until mitigations or firmware updates are available. This vulnerability could also undermine trust in cellular-based security controls and impact compliance with data protection regulations if exploited.
Mitigation Recommendations
Given the absence of official patches, organizations should implement network-level mitigations such as filtering and monitoring NAS protocol traffic to detect and block anomalous or malformed messages targeting Quectel BG96 modules. Deploying cellular firewalls or intrusion detection systems that understand NAS signaling can help prevent exploitation. Segmentation of IoT and M2M devices from critical networks reduces potential lateral movement. Device vendors and integrators should engage with Quectel for firmware updates or advisories and plan for timely patch deployment once available. Additionally, organizations should perform thorough asset inventories to identify affected devices and apply compensating controls such as disabling unnecessary cellular features or restricting device access to trusted networks. Continuous monitoring for unusual cellular activity and anomaly detection can provide early warning of exploitation attempts.
Affected Countries
United States, China, Germany, South Korea, Japan, India, France, United Kingdom, Canada, Australia
CVE-2024-54984: n/a
Description
CVE-2024-54984 is a critical vulnerability in the Quectel BG96 cellular module that allows attackers to bypass authentication by sending a crafted NAS message. This flaw can lead to full compromise of confidentiality, integrity, and availability without requiring any privileges or user interaction. Although the supplier disputes the issue, the CVSS score of 9. 8 indicates a severe risk. No patches are currently available, and no known exploits have been observed in the wild. The vulnerability relates to improper authentication controls (CWE-306) in the module's handling of NAS protocol messages. Organizations using Quectel BG96 modules in IoT or M2M devices should urgently assess exposure and implement network-level mitigations. Countries with significant deployments of Quectel modules, especially in telecom and industrial sectors, face the highest risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-54984 identifies a critical authentication bypass vulnerability in the Quectel BG96 cellular module, specifically the BG96MAR02A08M1G firmware. The flaw arises from improper validation of NAS (Non-Access Stratum) protocol messages, which are used for signaling between the cellular device and the network core. An attacker capable of sending a specially crafted NAS message can bypass the module's authentication mechanisms, effectively gaining unauthorized access to the device's cellular functions. This can lead to full compromise of the device's confidentiality, integrity, and availability, as the attacker can manipulate or disrupt cellular communications. The vulnerability is notable for requiring no privileges or user interaction, and it can be exploited remotely over the network. Despite the supplier disputing the vulnerability, the CVSS 3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reflects the high severity and ease of exploitation. No patches or firmware updates have been publicly released, and no active exploits have been reported in the wild. The issue is categorized under CWE-306, indicating missing or insufficient authentication controls. The vulnerability poses a significant risk to IoT, M2M, and embedded systems that rely on Quectel BG96 modules for cellular connectivity, potentially allowing attackers to intercept, manipulate, or disrupt communications and data flows.
Potential Impact
The impact of CVE-2024-54984 is severe for organizations deploying Quectel BG96 modules in their IoT, M2M, or embedded device fleets. Successful exploitation can lead to complete compromise of device communications, enabling attackers to intercept sensitive data, inject malicious commands, disrupt service availability, or pivot into internal networks. This threatens confidentiality, integrity, and availability of critical systems, especially in industrial automation, smart metering, transportation, and telecommunications infrastructure. The lack of required privileges or user interaction lowers the barrier for attackers, increasing the likelihood of exploitation once the vulnerability is known. The absence of patches means organizations remain exposed until mitigations or firmware updates are available. This vulnerability could also undermine trust in cellular-based security controls and impact compliance with data protection regulations if exploited.
Mitigation Recommendations
Given the absence of official patches, organizations should implement network-level mitigations such as filtering and monitoring NAS protocol traffic to detect and block anomalous or malformed messages targeting Quectel BG96 modules. Deploying cellular firewalls or intrusion detection systems that understand NAS signaling can help prevent exploitation. Segmentation of IoT and M2M devices from critical networks reduces potential lateral movement. Device vendors and integrators should engage with Quectel for firmware updates or advisories and plan for timely patch deployment once available. Additionally, organizations should perform thorough asset inventories to identify affected devices and apply compensating controls such as disabling unnecessary cellular features or restricting device access to trusted networks. Continuous monitoring for unusual cellular activity and anomaly detection can provide early warning of exploitation attempts.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-12-06T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6bcab7ef31ef0b55af35
Added to database: 2/25/2026, 9:38:18 PM
Last enriched: 2/26/2026, 1:59:58 AM
Last updated: 2/26/2026, 6:14:44 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.