Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-21476: CWE-20 Improper Input Validation in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2024-21476cvecve-2024-21476cwe-20
Published: Mon May 06 2024 (05/06/2024, 14:32:17 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption when the channel ID passed by user is not validated and further used.

AI-Powered Analysis

AILast updated: 12/23/2025, 17:12:43 UTC

Technical Analysis

CVE-2024-21476 is a vulnerability identified in multiple Qualcomm Snapdragon platforms, including mobile and compute chipsets, as well as modem-RF systems. The root cause is improper input validation (CWE-20) of a channel ID parameter supplied by the user. When this channel ID is not properly validated before use, it leads to memory corruption, which can be exploited to execute arbitrary code, escalate privileges, or cause denial of service. The affected products span a wide range of Snapdragon versions, from Snapdragon 865 5G Mobile Platform to Snapdragon XR2 5G Platform and various FastConnect and WCD components. The CVSS v3.1 score is 7.8, indicating high severity, with an attack vector limited to local access (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), and no user interaction (UI:N). The impact affects confidentiality, integrity, and availability (all rated high). Although no public exploits are known, the vulnerability's nature suggests that an attacker with local access could leverage it to compromise device security. This is particularly concerning for devices used in enterprise and critical infrastructure environments. The vulnerability was reserved in December 2023 and published in May 2024, with no patches currently linked, indicating that mitigation efforts are still pending or in progress. The broad range of affected chipsets means that many devices, including smartphones, IoT devices, and compute platforms, could be vulnerable. The flaw highlights the importance of rigorous input validation in embedded systems and the risks posed by local privilege escalation vectors in widely deployed hardware components.

Potential Impact

For European organizations, the impact of CVE-2024-21476 can be significant due to the widespread use of Qualcomm Snapdragon chipsets in mobile devices, laptops, and IoT equipment. Confidentiality breaches could expose sensitive corporate and personal data, while integrity compromises might allow attackers to alter device behavior or inject malicious code. Availability impacts could disrupt critical communications and business operations, especially in sectors relying on mobile connectivity and edge computing. Telecommunications providers and enterprises using Snapdragon-based compute platforms for remote work or industrial control systems are particularly at risk. The local attack vector implies that attackers need some form of access to the device, which could be achieved through insider threats, malware footholds, or physical access. Given the high penetration of Snapdragon-powered devices in Europe, including smartphones and embedded systems, the vulnerability could be exploited to target high-value individuals, government officials, or critical infrastructure operators. The lack of known exploits currently provides a window for proactive mitigation, but the potential for rapid weaponization remains. This vulnerability also raises concerns for supply chain security and device lifecycle management in European organizations.

Mitigation Recommendations

European organizations should implement a multi-layered mitigation strategy: 1) Monitor vendor communications closely for Qualcomm patches or firmware updates addressing CVE-2024-21476 and prioritize their deployment across all affected devices. 2) Restrict local access to devices with vulnerable Snapdragon components by enforcing strong physical security controls and endpoint access policies. 3) Employ endpoint detection and response (EDR) solutions to identify anomalous local activity that could indicate exploitation attempts. 4) Harden device configurations by disabling unnecessary services and interfaces that could provide local access vectors. 5) Educate users and administrators about the risks of local privilege escalation vulnerabilities and the importance of reporting suspicious behavior. 6) For organizations deploying IoT or embedded devices with affected chipsets, implement network segmentation to limit potential lateral movement from compromised devices. 7) Collaborate with device manufacturers and service providers to ensure timely updates and coordinated vulnerability disclosure. 8) Conduct regular security audits and penetration testing focusing on local access controls and input validation weaknesses in device firmware. These steps go beyond generic patching advice by emphasizing access control, monitoring, and supply chain coordination tailored to the Snapdragon ecosystem.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2023-12-12T06:07:46.905Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69418d789050fe8508ffbf4d

Added to database: 12/16/2025, 4:48:56 PM

Last enriched: 12/23/2025, 5:12:43 PM

Last updated: 2/4/2026, 11:39:53 AM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats