Skip to main content

CVE-2024-45554: CWE-416 Use After Free in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2024-45554cvecve-2024-45554cwe-416
Published: Tue May 06 2025 (05/06/2025, 08:31:53 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption during concurrent SSR execution due to race condition on the global maps list.

AI-Powered Analysis

AILast updated: 07/05/2025, 15:26:41 UTC

Technical Analysis

CVE-2024-45554 is a high-severity use-after-free vulnerability (CWE-416) affecting multiple Qualcomm Snapdragon platforms and associated wireless connectivity components. The root cause is a race condition on the global maps list during concurrent SSR (Subsystem Restart) execution, which leads to memory corruption. This vulnerability impacts a broad range of Qualcomm products, including FastConnect 6900 and 7800 modules, various Snapdragon mobile platforms such as Snapdragon 429, 8 Gen 1, 888, and 888+ 5G Mobile Platforms, as well as wireless connectivity chips like WCD9380, WCN3620, and WSA8830 series. The race condition allows an attacker with limited privileges (local access with low privileges) to trigger a use-after-free scenario without requiring user interaction, potentially leading to arbitrary code execution, privilege escalation, or denial of service. The CVSS v3.1 score of 7.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, combined with relatively low attack complexity and limited privileges required. Although no exploits are currently known in the wild, the vulnerability's nature and affected widespread mobile and wireless components make it a significant threat vector, especially for devices relying on Qualcomm Snapdragon chipsets for connectivity and processing. The lack of published patches at this time increases the urgency for affected parties to monitor updates and implement mitigations.

Potential Impact

For European organizations, this vulnerability poses a substantial risk due to the widespread use of Qualcomm Snapdragon chipsets in smartphones, IoT devices, and wireless communication equipment. Exploitation could lead to unauthorized access to sensitive data, disruption of communication services, and potential compromise of device integrity. Enterprises relying on mobile devices for secure communications, remote work, or critical infrastructure monitoring could face data breaches or operational disruptions. The vulnerability's ability to impact confidentiality, integrity, and availability simultaneously means that attackers could exfiltrate data, implant persistent malware, or cause device failures. Given the prevalence of Snapdragon-based devices in consumer and enterprise environments across Europe, the threat could affect sectors such as telecommunications, finance, healthcare, and government agencies. Additionally, the vulnerability could be leveraged in targeted attacks against high-value individuals or organizations, especially where mobile device security is paramount.

Mitigation Recommendations

To mitigate CVE-2024-45554 effectively, European organizations should: 1) Prioritize obtaining and deploying official patches or firmware updates from Qualcomm and device manufacturers as soon as they become available. 2) Implement strict access controls on devices using affected Snapdragon platforms to limit local privilege escalation opportunities, including enforcing strong authentication and restricting physical access. 3) Monitor device behavior for signs of memory corruption or abnormal subsystem restarts that could indicate exploitation attempts. 4) Employ endpoint detection and response (EDR) solutions capable of detecting anomalous activity related to use-after-free exploitation patterns. 5) For critical infrastructure and enterprise environments, consider network segmentation to isolate vulnerable devices and reduce lateral movement risk. 6) Engage with device vendors to confirm patch availability and timelines, and consider temporary mitigations such as disabling non-essential wireless features or SSR functionality if feasible. 7) Educate users on the importance of applying updates promptly and maintaining device security hygiene. These steps go beyond generic advice by focusing on access control, monitoring, vendor engagement, and operational adjustments tailored to the vulnerability's characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-09-02T10:26:15.223Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9c2f

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 3:26:41 PM

Last updated: 7/28/2025, 11:57:00 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats