Cyber Posture

CVE-2024-38404

High

Published: 03 February 2025

Published
03 February 2025
Modified
05 February 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0031 54.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-38404 is a high-severity Buffer Over-read (CWE-126) vulnerability in Qualcomm Ar8035 Firmware. Its CVSS base score is 7.5 (High).

Operationally, ranked in the top 45.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-11 (Error Handling).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the buffer over-read flaw in Qualcomm modems by applying vendor patches from the February 2025 security bulletin.

prevent

Validates the ciphering key data Information Element in incoming OTA registration accept messages to prevent processing malformed inputs that trigger buffer over-reads.

prevent

Ensures modem firmware handles errors from incorrect ciphering key data without crashing, avoiding transient DoS conditions.

NVD Description

Transient DOS when registration accept OTA is received with incorrect ciphering key data IE in modem.

Deeper analysisAI

CVE-2024-38404 is a vulnerability that triggers a transient denial-of-service (DoS) condition in modems upon receipt of a registration accept Over-The-Air (OTA) message containing incorrect ciphering key data Information Element (IE). It affects Qualcomm modem components and is associated with CWE-126 (Buffer Over-read) and CWE-125 (Out-of-bounds Read). The issue was published on 2025-02-03 with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), highlighting its high availability impact without affecting confidentiality or integrity.

Remote attackers can exploit this vulnerability over the network with low complexity, no required privileges, and no user interaction. Successful exploitation results in a transient DoS, temporarily disrupting modem operations such as connectivity or processing.

The Qualcomm February 2025 security bulletin at https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html provides details on mitigation, including affected products and available patches.

Details

CWE(s)

Affected Products

qualcomm
ar8035 firmware
all versions
qualcomm
fastconnect 7800 firmware
all versions
qualcomm
qca6584au firmware
all versions
qualcomm
qca6698aq firmware
all versions
qualcomm
qca8081 firmware
all versions
qualcomm
qca8337 firmware
all versions
qualcomm
qcc710 firmware
all versions
qualcomm
qcn6224 firmware
all versions
qualcomm
qcn6274 firmware
all versions
qualcomm
qfw7114 firmware
all versions
+30 more product configuration(s) — see NVD for full list

CVEs Like This One

CVE-2024-49838Same product: Qualcomm Ar8035
CVE-2024-45558Same product: Qualcomm Ar8035
CVE-2024-49839Same product: Qualcomm Ar8035
CVE-2025-21427Same product: Qualcomm Fastconnect 7800
CVE-2024-45546Same product: Qualcomm Fastconnect 7800
CVE-2024-45548Same product: Qualcomm Fastconnect 7800
CVE-2026-21381Same product: Qualcomm Ar8035
CVE-2026-21367Same product: Qualcomm Ar8035
CVE-2026-21375Same product: Qualcomm Fastconnect 7800
CVE-2025-47390Same product: Qualcomm Fastconnect 7800

References