First published: Mon Apr 01 2024(Updated: )
Transient DOS while decoding an ASN.1 OER message containing a SEQUENCE of unknown extensions.
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Qualcomm c-v2x 9150 firmware | ||
Qualcomm c-v2x 9150 | ||
All of | ||
qualcomm QCA6584AU firmware | ||
qualcomm QCA6584AU | ||
All of | ||
qualcomm qca6698aq firmware | ||
qualcomm qca6698aq | ||
All of | ||
qualcomm snapdragon auto 5g modem-rf firmware | ||
qualcomm snapdragon auto 5g modem-rf | ||
All of | ||
Qualcomm Snapdragon Auto 5G-RF Gen 2 Firmware | ||
qualcomm snapdragon auto 5g modem-rf gen 2 | ||
All of | ||
qualcomm snapdragon auto 4g modem firmware | ||
qualcomm snapdragon auto 4g modem |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21452 has been rated as a transient Denial of Service vulnerability that arises during the decoding of ASN.1 OER messages.
To mitigate CVE-2024-21452, it is advised to apply the necessary security patches released by Qualcomm for the affected firmware.
CVE-2024-21452 impacts Qualcomm firmware versions across various products including C-v2x 9150, Qca6584au, Qca6698aq, and Snapdragon Auto series.
Exploitation of CVE-2024-21452 may lead to a Denial of Service condition, affecting the availability of the device.
Yes, Qualcomm has provided a security bulletin addressing CVE-2024-21452 with recommended actions for affected users.