Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-43047: CWE-416 Use After Free in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2024-43047cvecve-2024-43047cwe-416
Published: Mon Oct 07 2024 (10/07/2024, 12:59:01 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while maintaining memory maps of HLOS memory.

AI-Powered Analysis

AILast updated: 10/21/2025, 19:31:56 UTC

Technical Analysis

CVE-2024-43047 is a use-after-free vulnerability classified under CWE-416 that affects a wide range of Qualcomm Snapdragon platforms and wireless connectivity modules. The flaw arises from improper handling of memory maps related to the High-Level Operating System (HLOS) memory, leading to memory corruption. This corruption can be exploited by an attacker with low-level privileges on the device to execute arbitrary code, escalate privileges, or cause a denial of service by crashing critical system components. The vulnerability affects numerous Snapdragon chipsets including FastConnect series (6700, 6800, 6900, 7800), multiple QCA models, Snapdragon 660, 865, 888 series, automotive modems, and video collaboration platforms, among others. The CVSS v3.1 score of 7.8 reflects high severity due to its impact on confidentiality, integrity, and availability, combined with low attack complexity and no requirement for user interaction. Although exploitation requires local access and some privileges, the broad deployment of these chipsets in mobile phones, automotive systems, and IoT devices increases the attack surface. No public exploits have been reported yet, but the vulnerability's nature suggests potential for impactful attacks if weaponized. Qualcomm has not yet published patches, but affected organizations should prepare to deploy updates promptly. The vulnerability's exploitation could lead to unauthorized data access, system compromise, or service disruption.

Potential Impact

For European organizations, the impact of CVE-2024-43047 is significant due to the widespread use of Qualcomm Snapdragon chipsets in consumer mobile devices, automotive telematics, industrial IoT, and telecommunications infrastructure. Confidentiality risks include unauthorized access to sensitive data stored or processed on affected devices. Integrity could be compromised by attackers executing arbitrary code or modifying system behavior, potentially leading to fraudulent activities or manipulation of device functions. Availability may be affected if the vulnerability is exploited to cause system crashes or denial of service, disrupting critical services such as mobile communications, automotive safety systems, or industrial controls. The automotive sector in Europe, which increasingly relies on Snapdragon-based platforms for connectivity and processing, faces heightened risks of safety-critical failures or unauthorized remote control. Telecommunications providers using Snapdragon modems in network equipment or customer devices could experience service degradation or breaches. The vulnerability's requirement for local access limits remote exploitation but does not eliminate risks from insider threats, compromised devices, or malware propagation. Overall, the threat could undermine trust in connected devices and infrastructure, leading to operational, financial, and reputational damage.

Mitigation Recommendations

1. Monitor Qualcomm's security advisories closely and apply official patches immediately upon release to affected Snapdragon platforms and modules. 2. Restrict local access to devices running vulnerable Snapdragon chipsets by enforcing strong physical security controls and limiting user privileges. 3. Implement endpoint detection and response (EDR) solutions to identify unusual memory corruption or privilege escalation attempts indicative of exploitation. 4. For automotive and industrial deployments, ensure secure boot and runtime integrity checks are enabled to detect unauthorized code execution. 5. Segment networks to isolate critical systems using Snapdragon-based devices, reducing the risk of lateral movement if a device is compromised. 6. Conduct regular security audits and penetration tests focusing on devices with affected chipsets to identify potential exploitation vectors. 7. Educate users and administrators about the risks of local privilege escalation vulnerabilities and the importance of applying updates promptly. 8. Employ application whitelisting and behavior monitoring on devices to prevent execution of unauthorized code resulting from exploitation. 9. Collaborate with device manufacturers and service providers to ensure timely firmware and software updates are delivered and installed. 10. Maintain comprehensive incident response plans that include scenarios involving exploitation of embedded chipset vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-08-05T14:22:16.918Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b4247d717aace26ab3

Added to database: 10/21/2025, 7:06:28 PM

Last enriched: 10/21/2025, 7:31:56 PM

Last updated: 10/29/2025, 10:56:14 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats