Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-21476: CWE-20 Improper Input Validation in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2024-21476cvecve-2024-21476cwe-20
Published: Mon May 06 2024 (05/06/2024, 14:32:17 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption when the channel ID passed by user is not validated and further used.

AI-Powered Analysis

AILast updated: 12/16/2025, 16:59:41 UTC

Technical Analysis

CVE-2024-21476 is a vulnerability identified in multiple Qualcomm Snapdragon platforms stemming from improper input validation (CWE-20) of a channel ID parameter provided by the user. The flaw results in memory corruption when the channel ID is not properly validated before use, potentially leading to arbitrary code execution or system instability. Affected products include a broad spectrum of Snapdragon chipsets such as the Snapdragon 865, 888 series, FastConnect modules, and various compute platforms (e.g., Snapdragon 8cx series). The vulnerability requires local access with low privileges and does not require user interaction, making it easier for attackers with limited access to exploit. The CVSS v3.1 score of 7.8 indicates high severity, with impacts on confidentiality, integrity, and availability. Although no known exploits are reported in the wild, the vulnerability poses a significant risk due to the widespread deployment of affected Snapdragon components in smartphones, laptops, and IoT devices. The root cause is the lack of proper validation of input parameters, which is a common and critical security oversight. Qualcomm has not yet published patches, so mitigation currently relies on access control and monitoring. This vulnerability could be leveraged by attackers to gain elevated privileges, execute arbitrary code, or cause denial of service, impacting device security and user data protection.

Potential Impact

For European organizations, the impact of CVE-2024-21476 is substantial given the widespread use of Snapdragon-based devices across consumer, enterprise, and industrial sectors. Exploitation could lead to unauthorized access to sensitive data, disruption of critical services, and compromise of device integrity. Mobile devices and compute platforms used by employees could be targeted to gain footholds in corporate networks. The vulnerability's ability to affect confidentiality, integrity, and availability simultaneously raises concerns for sectors handling sensitive information such as finance, healthcare, and government. Additionally, IoT devices and embedded systems using affected chipsets in industrial environments could experience operational disruptions. The lack of user interaction requirement lowers the barrier for exploitation, increasing risk. Organizations may face regulatory and reputational consequences if breaches occur due to this vulnerability. The absence of patches at present necessitates proactive risk management to prevent exploitation.

Mitigation Recommendations

1. Monitor Qualcomm’s advisories closely and apply security patches immediately upon release to affected devices and platforms. 2. Implement strict access controls to limit local access to devices with vulnerable Snapdragon components, including enforcing least privilege principles. 3. Employ endpoint detection and response (EDR) solutions to monitor for anomalous behavior indicative of exploitation attempts, such as memory corruption or unauthorized code execution. 4. Segment networks to isolate critical systems and reduce the attack surface exposed to potentially compromised devices. 5. For organizations deploying IoT or embedded devices with Snapdragon chipsets, conduct thorough security assessments and consider compensating controls such as application whitelisting and runtime integrity checks. 6. Educate users and administrators about the risks associated with local access vulnerabilities and enforce strong physical security measures to prevent unauthorized device access. 7. Collaborate with device manufacturers and service providers to ensure timely firmware and software updates. 8. Use vulnerability scanning tools capable of detecting affected Snapdragon versions within the organization’s asset inventory to prioritize remediation efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2023-12-12T06:07:46.905Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69418d789050fe8508ffbf4d

Added to database: 12/16/2025, 4:48:56 PM

Last enriched: 12/16/2025, 4:59:41 PM

Last updated: 12/19/2025, 11:00:33 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats