CVE-2024-53021

| EUVD-2024-54632 HIGH
2025-06-03 [email protected]
8.2
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
Low

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 17:04 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 17:04 euvd
EUVD-2024-54632
CVE Published
Jun 03, 2025 - 06:15 nvd
HIGH 8.2

Tags

Information Disclosure Qcn9011 Firmware Wcn7860 Firmware Wcd9340 Firmware Wcn6450 Firmware Sw5100p Firmware Qam8650p Firmware Video Collaboration Vc3 Platform Firmware Sm8650q Firmware Snapdragon 720g Mobile Platform Firmware Wcd9395 Firmware Wcd9335 Firmware Snapdragon 429 Mobile Platform Firmware Sa8150p Firmware Qam8295p Firmware 205 Mobile Platform Firmware Qcs615 Firmware Sa8295p Firmware Qca6797aq Firmware Snapdragon 636 Mobile Platform Firmware Sm7250p Firmware Video Collaboration Vc1 Platform Firmware Sg4150p Firmware Qca6574au Firmware Qcs2290 Firmware Qcs610 Firmware Snapdragon 865 5g Mobile Platform Firmware Wcn3610 Firmware Qca6335 Firmware Snapdragon 670 Mobile Platform Firmware Sa8145p Firmware Sa8255p Firmware Sm8635p Firmware 215 Mobile Platform Firmware Qcs9100 Firmware Qcs6490 Firmware Snapdragon 4 Gen 2 Mobile Platform Firmware Sd730 Firmware Qcn9012 Firmware Sa8775p Firmware Snapdragon 630 Mobile Platform Firmware Sd 8 Gen1 5g Firmware Qca6574 Firmware Wcn3980 Firmware Wcd9326 Firmware Wsa8845 Firmware Snapdragon Xr1 Platform Firmware Qcm5430 Firmware Wcn3990 Firmware Qca6391 Firmware Vision Intelligence 300 Platform Firmware Aqt1000 Firmware Snapdragon 439 Mobile Platform Firmware Fastconnect 7800 Firmware Wcn7861 Firmware Sm7675 Firmware Sm6650p Firmware Wsa8832 Firmware Qca6678aq Firmware Qca6698aq Firmware Sm8750 Firmware Snapdragon 855 Mobile Platform Firmware Sa6155 Firmware Wcd9380 Firmware Wcn6650 Firmware Snapdragon 690 5g Mobile Platform Firmware Snapdragon Xr2 5g Platform Firmware Snapdragon 480 5g Mobile Platform Firmware Sa6155p Firmware Sa4155p Firmware Wcn3615 Firmware Snapdragon 662 Mobile Platform Firmware Qamsrv1m Firmware Qcm4290 Firmware Snapdragon 835 Mobile Pc Platform Firmware Qca6696 Firmware Wcd9370 Firmware Qcm2290 Firmware Sm8750p Firmware Wcn7881 Firmware Wcn7750 Firmware Qam8620p Firmware Apq8017 Firmware Sm4635 Firmware Snapdragon 888 5g Mobile Platform Firmware Sm4125 Firmware Sm8735 Firmware Sa8195p Firmware Wcn3680 Firmware Qca6420 Firmware Sa6145p Firmware Qam8255p Firmware Snapdragon 8 Gen 1 Mobile Platform Firmware Wcn6755 Firmware Wcd9378 Firmware Sm6370 Firmware Sd865 5g Firmware Wsa8815 Firmware Sxr2130 Firmware Snapdragon 695 5g Mobile Platform Firmware Sa8155 Firmware Sw5100 Firmware Qcs6125 Firmware Qam8775p Firmware Wcn6740 Firmware Robotics Rb3 Platform Firmware Sa8770p Firmware Wcd9390 Firmware Qcm4325 Firmware Qcm6490 Firmware Sd670 Firmware Sm6650 Firmware Qcm4490 Firmware Sm6250 Firmware Sm8635 Firmware Snapdragon 660 Mobile Platform Firmware Qcs5430 Firmware Qcm2150 Firmware Wcn3660b Firmware Wcd9385 Firmware Sm8550p Firmware Snapdragon 780g 5g Mobile Platform Firmware Qcs4490 Firmware Sd888 Firmware Vision Intelligence 400 Platform Firmware Sdx55 Firmware Sm7325p Firmware Qca6688aq Firmware Qmp1000 Firmware Sd660 Firmware Snapdragon 8 Gen 3 Mobile Platform Firmware Qca6421 Firmware Qcn9274 Firmware Talynplus Firmware Snapdragon 8 Gen 2 Mobile Platform Firmware Qamsrv1h Firmware Qcm6125 Firmware Qcs8550 Firmware Qcm8550 Firmware Wcn3950 Firmware Qca6436 Firmware Snapdragon 675 Mobile Platform Firmware Sm7635 Firmware Snapdragon 4 Gen 1 Mobile Platform Firmware Qca6320 Firmware Wcn3910 Firmware Fastconnect 6200 Firmware Sd855 Firmware Qca6310 Firmware Wcn3988 Firmware Wsa8840 Firmware Sa8620p Firmware Qca6595 Firmware Wsa8845h Firmware Snapdragon 680 4g Mobile Platform Firmware Snapdragon 778g 5g Mobile Platform Firmware Sm7675p Firmware Wcn3680b Firmware Snapdragon 845 Mobile Platform Firmware Qcs8300 Firmware Snapdragon 460 Mobile Platform Firmware Qca6431 Firmware Sa9000p Firmware Snapdragon X50 5g Modem Rf System Firmware Qca6426 Firmware Snapdragon 625 Mobile Platform Firmware Sa4150p Firmware Sd835 Firmware Sa7775p Firmware Sa7255p Firmware Wsa8835 Firmware Sxr1120 Firmware Qca6595au Firmware Sa6150p Firmware Qca6430 Firmware Snapdragon 750g 5g Mobile Platform Firmware Fastconnect 6900 Firmware Sa8650p Firmware Fastconnect 6700 Firmware Wsa8830 Firmware Snapdragon 210 Processor Firmware Wsa8810 Firmware Sdm429w Firmware Snapdragon 632 Mobile Platform Firmware Wcn3620 Firmware Snapdragon 425 Mobile Platform Firmware Sa8155p Firmware Srv1m Firmware Wcd9375 Firmware Srv1l Firmware Fastconnect 6800 Firmware Sm7315 Firmware Sd626 Firmware Snapdragon 710 Mobile Platform Firmware Srv1h Firmware Wcn7880 Firmware Wcd9341 Firmware Qca6574a Firmware Snapdragon X55 5g Modem Rf System Firmware Qcs4290 Firmware Snapdragon 212 Mobile Platform Firmware Snapdragon 626 Mobile Platform Firmware Qcs410 Firmware

Description

Information disclosure may occur while processing goodbye RTCP packet from network.

Analysis

CVE-2024-53021 is an information disclosure vulnerability in RTCP (Real-time Transport Control Protocol) packet processing that allows unauthenticated remote attackers to leak sensitive data through malicious goodbye (BYE) RTCP packets. The vulnerability affects multiple VoIP and real-time communication products processing RTCP traffic; attackers can extract confidential information across the network without authentication or user interaction, and may also cause limited availability impact. The high CVSS score of 8.2 reflects the severe confidentiality impact and network-based attack vector, though exploitation complexity is low.

Technical Context

RTCP (Real-time Transport Control Protocol, RFC 3550) is a companion protocol to RTP used for control and feedback in multimedia streaming applications. The vulnerability exists in RTCP BYE (goodbye) packet processing logic, a fundamental control message that indicates a participant is leaving an RTP session. CWE-126 (Buffer Over-read) indicates the root cause involves reading beyond intended buffer boundaries during RTCP packet parsing, likely when handling malformed BYE packet payloads or option fields. This buffer over-read can expose adjacent memory containing session keys, authentication tokens, codec parameters, or other sensitive RTP/RTCP session data. The vulnerability chain involves: (1) receipt of network RTCP BYE packet, (2) insufficient bounds checking during deserialization, (3) out-of-bounds memory access leaking heap or stack data. Affected products typically include VoIP endpoints (SIP phones, softphones), media servers, RTC libraries, and unified communications platforms that implement RTCP per RFC 3550.

Affected Products

The CVE description does not specify vendor names or products, and no CPE strings were provided in the input. Based on the RTCP processing vulnerability class, potential affected categories include: (1) VoIP/UCaaS platforms (Cisco Webex, Microsoft Teams media stack, Zoom RTC engine, Avaya Communication Manager), (2) Open-source RTC libraries (libsrtp, pjsip, asterisk), (3) WebRTC implementations (Chromium, Firefox media engines), (4) Enterprise PBX systems, (5) Media servers (FreeSWITCH, Kamailio). Without vendor advisory references or CPE data provided, a precise affected product list cannot be constructed. Immediate action: check vendor advisories for RFC 3550 RTCP implementations and query NVD CPE records using CVE-2024-53021 identifier for authoritative product versions.

Remediation

Specific patch information was not provided in the input. Remediation steps follow standard vulnerability response: (1) Consult vendor security advisories linked to CVE-2024-53021 for affected product versions and patched releases, (2) Apply security patches immediately to production systems, prioritizing media servers and SIP endpoints, (3) If patches unavailable, implement network-level RTCP filtering/monitoring to detect malformed BYE packets using DPI (deep packet inspection) rules that validate RTCP packet structure per RFC 3550, (4) Disable RTCP BYE processing if operationally feasible, falling back to session timeout mechanisms, (5) Isolate RTP sessions to trusted networks with firewall rules restricting RTCP traffic to known peer ranges, (6) Monitor for exploit attempts: log RTCP parsing errors, malformed packet drops, and memory access violations. Escalate to vendor support for specific patch timelines and zero-day guidance if production instances cannot be patched immediately.

Priority Score

41
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +41
POC: 0

Share

CVE-2024-53021 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy