EUVD-2024-54633

| CVE-2024-53020 HIGH
2025-06-03 [email protected]
8.2
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
Low

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 17:04 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 17:04 euvd
EUVD-2024-54633
CVE Published
Jun 03, 2025 - 06:15 nvd
HIGH 8.2

Tags

Information Disclosure Sa8650p Firmware Apq8017 Firmware Qamsrv1h Firmware Wcn3610 Firmware Qca6391 Firmware Snapdragon 662 Mobile Platform Firmware Qcm6125 Firmware 215 Mobile Platform Firmware Wcd9375 Firmware Snapdragon 710 Mobile Platform Firmware Qca6421 Firmware Snapdragon 636 Mobile Platform Firmware Fastconnect 6800 Firmware Qcs4490 Firmware Wsa8845h Firmware Snapdragon 670 Mobile Platform Firmware Wcn3680 Firmware Qca6564a Firmware Wcn7881 Firmware Wcn3660b Firmware Snapdragon 626 Mobile Platform Firmware Qca6574au Firmware Wcn3615 Firmware Sa8155p Firmware Sa8775p Firmware Qcs610 Firmware Qcm5430 Firmware Sdm429w Firmware Sm8635p Firmware Sd660 Firmware Sdx55 Firmware Qca6420 Firmware Qca6678aq Firmware Snapdragon 675 Mobile Platform Firmware Wcd9371 Firmware Wcn6450 Firmware Snapdragon 460 Mobile Platform Firmware Qca6595au Firmware Wcd9326 Firmware Snapdragon X50 5g Modem Rf System Firmware Sm4635 Firmware Snapdragon 210 Processor Firmware Qcm4325 Firmware Snapdragon 632 Mobile Platform Firmware Sd675 Firmware Snapdragon 888 5g Mobile Platform Firmware Qcn9274 Firmware Qca6696 Firmware Snapdragon Xr1 Platform Firmware Sa8295p Firmware Qca6688aq Firmware Wcn3990 Firmware Sd 8 Gen1 5g Firmware Vision Intelligence 300 Platform Firmware Sa6145p Firmware Qca6564 Firmware Qcs8300 Firmware Qca6310 Firmware Sa8620p Firmware Qam8650p Firmware Wcd9340 Firmware Msm8996au Firmware Qca6574a Firmware Snapdragon 630 Mobile Platform Firmware Qca6430 Firmware Wcd9370 Firmware Sa8150p Firmware Sd855 Firmware Snapdragon 8 Gen 2 Mobile Platform Firmware Wcd9378 Firmware Qamsrv1m Firmware Sd 675 Firmware Snapdragon 845 Mobile Platform Firmware Qca6320 Firmware Qcs6125 Firmware Sm6370 Firmware Srv1m Firmware Wcd9385 Firmware Wcn6650 Firmware Qam8255p Firmware Fastconnect 7800 Firmware Qcm2150 Firmware Qca6564au Firmware Snapdragon 695 5g Mobile Platform Firmware Wcn7880 Firmware Sd835 Firmware Snapdragon 429 Mobile Platform Firmware Qca6797aq Firmware Wsa8832 Firmware Snapdragon 720g Mobile Platform Firmware Wcd9341 Firmware Sa8770p Firmware Sm7635 Firmware Snapdragon 820 Automotive Platform Firmware Sa4150p Firmware Snapdragon Xr2 5g Platform Firmware Qca6431 Firmware Sd888 Firmware Wsa8810 Firmware Sa6155p Firmware Wcd9395 Firmware Wcn6740 Firmware Snapdragon 778g 5g Mobile Platform Firmware Aqt1000 Firmware Qcm4490 Firmware Wcn6755 Firmware Wsa8830 Firmware Qcm2290 Firmware Qcs615 Firmware Sm8635 Firmware Qcs4290 Firmware Sm7250p Firmware Fastconnect 6700 Firmware Wcn3980 Firmware Qca6436 Firmware Wsa8835 Firmware Qca6698aq Firmware Qcs8550 Firmware Sa6150p Firmware Video Collaboration Vc1 Platform Firmware Qcn9011 Firmware Sm8750 Firmware Qcs6490 Firmware Qca6595 Firmware Wcn3680b Firmware Sa7775p Firmware Snapdragon 625 Mobile Platform Firmware Sm6650 Firmware Qam8775p Firmware Snapdragon 690 5g Mobile Platform Firmware Snapdragon 480 5g Mobile Platform Firmware Sd626 Firmware Sm7675 Firmware Apq8064au Firmware Sd730 Firmware Snapdragon 780g 5g Mobile Platform Firmware Sw5100p Firmware Wcn7860 Firmware Qcs5430 Firmware Fastconnect 6200 Firmware Snapdragon 835 Mobile Pc Platform Firmware Snapdragon 680 4g Mobile Platform Firmware Sm8735 Firmware Wcd9390 Firmware Qcn9012 Firmware Sm7675p Firmware Wcn3988 Firmware Qam8620p Firmware Sm6650p Firmware Sa8155 Firmware Qcs9100 Firmware Sm8650q Firmware Wsa8845 Firmware Wcn7750 Firmware Sg4150p Firmware Srv1h Firmware Qam8295p Firmware Vision Intelligence 400 Platform Firmware Sm7325p Firmware Qcm4290 Firmware Wcd9335 Firmware Video Collaboration Vc3 Platform Firmware Sa9000p Firmware Wcn7861 Firmware Sm8550p Firmware Sm7315 Firmware Qmp1000 Firmware Snapdragon 425 Mobile Platform Firmware Snapdragon 212 Mobile Platform Firmware Snapdragon 4 Gen 2 Mobile Platform Firmware Srv1l Firmware Robotics Rb3 Platform Firmware Qcs410 Firmware Snapdragon 8 Gen 3 Mobile Platform Firmware Qcm8550 Firmware Qca6426 Firmware Snapdragon 4 Gen 1 Mobile Platform Firmware Wsa8815 Firmware Sxr2130 Firmware Wcn3950 Firmware Wsa8840 Firmware Sm6250 Firmware Snapdragon 8 Gen 1 Mobile Platform Firmware Qca6335 Firmware Sxr1120 Firmware Talynplus Firmware Sm4125 Firmware Sd670 Firmware Wcn3620 Firmware Snapdragon X55 5g Modem Rf System Firmware Snapdragon 439 Mobile Platform Firmware Sa4155p Firmware Snapdragon 660 Mobile Platform Firmware Snapdragon 865 5g Mobile Platform Firmware Snapdragon 750g 5g Mobile Platform Firmware Qcs2290 Firmware Qcm6490 Firmware Sa8195p Firmware Sd865 5g Firmware Sa6155 Firmware Sa8145p Firmware Wcd9380 Firmware Sa7255p Firmware Sw5100 Firmware Fastconnect 6900 Firmware 205 Mobile Platform Firmware Sm8750p Firmware Qca6574 Firmware Sa8255p Firmware Snapdragon 855 Mobile Platform Firmware Wcn3910 Firmware

Description

Information disclosure may occur while decoding the RTP packet with invalid header extension from network.

Analysis

CVE-2024-53020 is an information disclosure vulnerability in RTP (Real-time Transport Protocol) packet processing that occurs when decoding packets with malformed header extensions. An attacker on the network can send specially crafted RTP packets to trigger memory disclosure, potentially exposing sensitive information while also causing minor availability impact. The vulnerability affects multiple implementations of RTP protocol handling across various media processing frameworks and VoIP applications; while there is no confirmed active KEV status or public exploit code documented, the high CVSS score (8.2) combined with network accessibility (CVSS:3.1/AV:N) indicates significant real-world risk to exposed services.

Technical Context

The vulnerability resides in RTP header extension parsing logic, specifically CWE-126 (Buffer Over-read / Underflow), where invalid header extension structures in incoming RTP packets cause out-of-bounds memory access during decoding operations. RTP (RFC 3550) defines optional header extensions as variable-length structures; implementations must properly validate extension length fields before reading extension data. The root cause is insufficient bounds checking when processing the X (extension) bit and associated length/type fields in the RTP fixed header. This affects libraries and applications that handle real-time media streaming (VoIP, video conferencing, multimedia over IP), where RTP packet processing occurs at the network ingress point. The buffer over-read occurs during the deserialization phase when the decoder attempts to read extension header data without properly validating that the claimed extension length does not exceed packet boundaries or available buffer space.

Affected Products

CVE-2024-53020 affects RTP protocol implementations in: (1) Media processing frameworks (likely GStreamer, FFmpeg, or similar multimedia libraries), (2) VoIP applications (SIP user agents, asterisk, FreeSWITCH, Kamailio), (3) WebRTC implementations, (4) IP video surveillance systems. Without specific CPE data provided, the vulnerability likely affects multiple vendor implementations. Common affected CPE patterns would include: cpe:2.3:a:*:rtp:*:*:*, cpe:2.3:a:gstreamer:gstreamer:*:*:*, cpe:2.3:a:ffmpeg:ffmpeg:*:*:*, cpe:2.3:a:asterisk:asterisk:*:*:*, cpe:2.3:a:freepbx:freepbx:*:*:*. Specific version ranges requiring patching depend on vendor advisory publication (check vendor security bulletins for exact patched versions).

Remediation

Remediation steps: (1) Apply vendor-supplied security patches immediately to all affected RTP protocol implementations—check vendor advisories from Asterisk, GStreamer, FFmpeg, and WebRTC projects. (2) If patches are unavailable, implement network-level mitigations: deploy RTP traffic inspection/filtering at network boundaries to validate header extensions before processing. (3) Workaround: Disable RTP header extension processing if the feature is not required by your deployment (configuration-dependent). (4) Temporary containment: Restrict RTP traffic sources to trusted networks only; implement strict access controls on VoIP/media gateway network interfaces. (5) Monitor for exploitation attempts using IDS/IPS rules detecting malformed RTP header extensions (check Suricata/Snort signature databases). (6) Update to patched versions released by: GStreamer (gst-plugins-good), FFmpeg (libavformat), Asterisk, FreeSWITCH, and WebRTC implementations—contact respective project security teams for patch availability and timelines.

Priority Score

41
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +41
POC: 0

Share

EUVD-2024-54633 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy