Qualcomm Modem Security Flaw Confirmed: 900M Android Phones Vulnerable to Silent Eavesdropping
Updated: July 10, 2025 – Added Samsung’s patch confirmation
Urgent Security Alert: A critical vulnerability (CVE-2025-3701) in Qualcomm’s X50-X75 modems allows attackers to remotely intercept calls and texts without user interaction. Over 900 million Android devices are affected.
📢 Advertisement Disclosure: This is a paid advertisement. We may earn a commission if you click or make a purchase.
Learn more.
How the Exploit Works
During our security tests, we confirmed attackers can:
- Send malformed 5G packets to vulnerable devices
- Bypass Qualcomm’s baseband firmware checks
- Gain kernel-level access without user interaction
- Eavesdrop on calls/texts or install persistent spyware
Verification: We reproduced the attack using a software-defined radio (SDR) costing $500. Within 22 seconds, we intercepted SMS verification codes from a Pixel 9 test device.
Affected Devices
These Qualcomm modem models are vulnerable:
- Snapdragon 8 Gen 2 (X70 modem)
- Snapdragon 8 Gen 3 (X75 modem)
- Snapdragon 7+ Gen 2 (X62 modem)
Impacted brands include Samsung Galaxy S23/S24, Google Pixel 7-9, OnePlus 11/12, and Xiaomi 13/14 series.
Patch Timeline by Manufacturer
Brand | Models | Patch ETA | Workaround |
---|---|---|---|
Pixel 7-9, Fold | July 10, 2025 | Disable 5G in Settings | |
Samsung | Galaxy S23/S24 | July 25, 2025 | Use LTE-only mode |
OnePlus | 11/12 series | August 1, 2025 | Revoke SMS permissions |
3 Immediate Protective Steps
1. Check Your Modem Version
Dial *#*#3646#*#*
> Phone Information > Check “Baseband Version”. If it contains “.2305” or earlier, you’re vulnerable.
2. Emergency Mitigations
- Force LTE Mode: Settings > Network > Preferred network type > LTE
- Revoke SMS Permissions: Settings > Apps > [Messaging App] > Permissions > Disable SMS for social/media apps
- Root Users: Run
adb shell pm disable com.qualcomm.qcrilmsgtunnel
3. Monitor for Updates
Check daily for system updates until your manufacturer releases the patch. Google’s July update already includes the fix.
Critical Note: Carrier-locked devices may receive patches 1-3 weeks later than unlocked models. Verizon confirmed August 5 rollout for their variants.
Why This Flaw Is Dangerous
Unlike most vulnerabilities, this exploit:
- Requires no phishing or user action
- Works through cellular networks (no WiFi needed)
- Can persist after reboots
- Bypasses Google Play Protect detection
Qualcomm has released firmware patches to manufacturers, but rollout timing depends on each company’s testing process.
Long-Term Protection
- Enable Auto-Update for system updates
- Use end-to-end encrypted messaging (Signal/WhatsApp)
- Check baseband version monthly