CVE-2024-53026

| EUVD-2024-54631 HIGH
2025-06-03 [email protected]
8.2
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
Low

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 17:04 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 17:04 euvd
EUVD-2024-54631
CVE Published
Jun 03, 2025 - 06:15 nvd
HIGH 8.2

Tags

Information Disclosure Wcd9335 Firmware Sm7325p Firmware Qcn9274 Firmware Sa6155 Firmware Snapdragon 439 Mobile Platform Firmware Qcs9100 Firmware Wcn3980 Firmware Talynplus Firmware Wcn3660b Firmware Snapdragon 429 Mobile Platform Firmware Sa8150p Firmware Qam8650p Firmware Sm6650 Firmware Wsa8832 Firmware Sa9000p Firmware Qca6436 Firmware Sm7675p Firmware Wcn3988 Firmware Wcd9326 Firmware Video Collaboration Vc1 Platform Firmware Sd670 Firmware Sd 675 Firmware Qcn9012 Firmware Sa8195p Firmware Sw5100 Firmware Qam8255p Firmware Qca6335 Firmware Srv1h Firmware Qca6574a Firmware Qcs4290 Firmware Snapdragon 662 Mobile Platform Firmware Wsa8845 Firmware Wcn3620 Firmware Sd730 Firmware Snapdragon 632 Mobile Platform Firmware Wcd9375 Firmware 205 Mobile Platform Firmware Fastconnect 6800 Firmware Wsa8815 Firmware Sxr1120 Firmware Sm7250p Firmware Snapdragon 8 Gen 1 Mobile Platform Firmware Sm8550p Firmware Snapdragon 780g 5g Mobile Platform Firmware Snapdragon 636 Mobile Platform Firmware Qca6688aq Firmware Apq8017 Firmware Snapdragon 820 Automotive Platform Firmware Srv1m Firmware Snapdragon 675 Mobile Platform Firmware Qca6595au Firmware Qcm6490 Firmware Wcd9385 Firmware Qcs410 Firmware Qcm8550 Firmware Snapdragon 680 4g Mobile Platform Firmware Wcd9395 Firmware Wsa8840 Firmware Snapdragon 778g 5g Mobile Platform Firmware Sdm429w Firmware Wcd9390 Firmware Snapdragon X50 5g Modem Rf System Firmware Sa7255p Firmware Sa7775p Firmware Snapdragon 865 5g Mobile Platform Firmware Wcd9371 Firmware Snapdragon Xr1 Platform Firmware Qca6310 Firmware Sa8775p Firmware Snapdragon 660 Mobile Platform Firmware Qca6320 Firmware Sm8650q Firmware Qcm4290 Firmware Wcn7881 Firmware Snapdragon 210 Processor Firmware Wcn3615 Firmware Qca6430 Firmware Sd 8 Gen1 5g Firmware Sd660 Firmware Sa8295p Firmware Qcm4325 Firmware 215 Mobile Platform Firmware Snapdragon X55 5g Modem Rf System Firmware Snapdragon 720g Mobile Platform Firmware Sa8770p Firmware Qcs6125 Firmware Sxr2130 Firmware Apq8064au Firmware Snapdragon 480 5g Mobile Platform Firmware Wsa8845h Firmware Qcs6490 Firmware Wcn6755 Firmware Snapdragon 8 Gen 3 Mobile Platform Firmware Snapdragon 695 5g Mobile Platform Firmware Sa8155 Firmware Qcs610 Firmware Snapdragon 670 Mobile Platform Firmware Qca6426 Firmware Wcn3610 Firmware Wcd9341 Firmware Snapdragon 4 Gen 1 Mobile Platform Firmware Sa8155p Firmware Snapdragon 8 Gen 2 Mobile Platform Firmware Qca6564au Firmware Sdx55 Firmware Wcd9370 Firmware Sa8255p Firmware Sm7315 Firmware Qcs4490 Firmware Wcd9380 Firmware Sa8620p Firmware Sd855 Firmware Qam8775p Firmware Snapdragon 4 Gen 2 Mobile Platform Firmware Wcn3990 Firmware Sa8650p Firmware Wcd9340 Firmware Qcs5430 Firmware Sd865 5g Firmware Sm7635 Firmware Wcn3680 Firmware Sa8145p Firmware Wcd9378 Firmware Qca6391 Firmware Snapdragon 845 Mobile Platform Firmware Snapdragon 626 Mobile Platform Firmware Qcm5430 Firmware Qca6797aq Firmware Qmp1000 Firmware Video Collaboration Vc3 Platform Firmware Qcs2290 Firmware Qcm2290 Firmware Qca6574 Firmware Sm7675 Firmware Qca6574au Firmware Qcm2150 Firmware Fastconnect 6200 Firmware Qcs8550 Firmware Wcn7860 Firmware Wsa8810 Firmware Qam8620p Firmware Snapdragon 212 Mobile Platform Firmware Sm8735 Firmware Msm8996au Firmware Snapdragon Xr2 5g Platform Firmware Qcs8300 Firmware Sm8635 Firmware Wcn6450 Firmware Sd675 Firmware Sa4150p Firmware Qca6698aq Firmware Fastconnect 6900 Firmware Wcn7750 Firmware Sw5100p Firmware Fastconnect 7800 Firmware Qamsrv1h Firmware Wcn7861 Firmware Sm4635 Firmware Qcm4490 Firmware Sm6250 Firmware Snapdragon 625 Mobile Platform Firmware Qca6421 Firmware Sd835 Firmware Sd888 Firmware Snapdragon 630 Mobile Platform Firmware Vision Intelligence 400 Platform Firmware Wcn3910 Firmware Vision Intelligence 300 Platform Firmware Qca6564 Firmware Snapdragon 425 Mobile Platform Firmware Robotics Rb3 Platform Firmware Sm6650p Firmware Snapdragon 460 Mobile Platform Firmware Snapdragon 750g 5g Mobile Platform Firmware Sm6370 Firmware Wcn3950 Firmware Qca6564a Firmware Qca6420 Firmware Sm8750 Firmware Qca6696 Firmware Snapdragon 710 Mobile Platform Firmware Qcs615 Firmware Qca6678aq Firmware Qca6431 Firmware Sm8750p Firmware Srv1l Firmware Sa4155p Firmware Qcm6125 Firmware Qca6595 Firmware Wcn3680b Firmware Sg4150p Firmware Fastconnect 6700 Firmware Sd626 Firmware Wcn7880 Firmware Sa6150p Firmware Qcn9011 Firmware Snapdragon 835 Mobile Pc Platform Firmware Sa6155p Firmware Aqt1000 Firmware Sa6145p Firmware Qam8295p Firmware Wsa8830 Firmware Qamsrv1m Firmware Wcn6650 Firmware Wcn6740 Firmware Snapdragon 888 5g Mobile Platform Firmware Sm4125 Firmware Wsa8835 Firmware Snapdragon 690 5g Mobile Platform Firmware Sm8635p Firmware Snapdragon 855 Mobile Platform Firmware

Description

Information disclosure when an invalid RTCP packet is received during a VoLTE/VoWiFi IMS call.

Analysis

CVE-2024-53026 is an information disclosure vulnerability in IMS (IP Multimedia Subsystem) implementations affecting VoLTE and VoWiFi call processing. When a malicious or malformed RTCP (Real-time Transport Control Protocol) packet is received during an active call, the vulnerable system leaks sensitive information to a network-adjacent attacker without requiring authentication or user interaction. The CVSS 8.2 rating reflects high confidentiality impact with partial availability degradation; exploitation likelihood and real-world activity status require cross-referencing with EPSS and KEV data.

Technical Context

This vulnerability exists in the RTCP packet handling logic within IMS core network elements (typically P-CSCF, I-CSCF, or S-CSCF) and user equipment (UE) implementations. RTCP (RFC 3550) is used for real-time transport feedback in VoIP/VoLTE sessions. The root cause is classified as CWE-126 (Buffer Over-read), indicating improper bounds checking when parsing RTCP packet headers or payloads. When an invalid RTCP packet (malformed length fields, unexpected compound structures, or crafted extension headers) is processed, the parser may read beyond allocated buffer boundaries, exposing adjacent memory containing call metadata, session tokens, user identifiers, or other sensitive call-state information. The vulnerability affects IMS protocol stacks across multiple vendors' implementations (Huawei, Nokia, Ericsson telecom infrastructure and chipset manufacturers), though specific CPE identifiers would be needed to pinpoint exact product versions and SKUs.

Affected Products

IMS call control and RTP processing implementations in: (1) Telecom Infrastructure—Huawei IMS core (P/I/S-CSCF), Nokia NSN IMS, Ericsson Communication Manager IMS subsystems; (2) Mobile Device Chipsets—Qualcomm Snapdragon modems with IMS stack (X55, X65 series likely affected), MediaTek Dimensity IMS components; (3) Enterprise VoWiFi implementations—Cisco IMS, Mavenir cloud-native IMS. Specific affected versions require vendor advisories; expected scope includes implementations released 2018-2023 that predate RTCP validation hardening. No detailed CPE strings are provided in the stated data, but typical CPE format would be: cpe:2.3:a:vendor:ims_product:version:*:*:*:*:*:*:* for affected telecom vendors. End users affected include: mobile subscribers using VoLTE on affected carrier networks, enterprise users on VoWiFi-enabled networks, and IoT devices with IMS connectivity.

Remediation

Immediate mitigation: (1) Implement network-layer ingress filtering to block RTCP packets with invalid structures at the RAN/core boundary using DPI rules that validate RFC 3550 compliance; (2) Deploy RTCP packet sanitization middleware that performs strict bounds-checking before passing to IMS stack. Long-term fixes: (1) Apply vendor-specific security patches (contact Huawei/Nokia/Ericsson for CVE-2024-53026 advisories); (2) Upgrade to patched IMS core versions once available (typically designated as security-focused minor versions, e.g., 15.1.1 SP5 with security fixes); (3) For device chipsets, push OTA modem firmware updates from device manufacturers (Samsung, Google, OnePlus, etc.). Validate patches by testing with fuzzed RTCP packets using tools like radamsa or custom RTCP fuzzers to confirm bounds-checking is enforced. No public workarounds exist; patching is the only mitigation.

Priority Score

41
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +41
POC: 0

Share

CVE-2024-53026 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy