Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45554: CWE-416 Use After Free in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2024-45554cvecve-2024-45554cwe-416
Published: Tue May 06 2025 (05/06/2025, 08:31:53 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption during concurrent SSR execution due to race condition on the global maps list.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:20:12 UTC

Technical Analysis

CVE-2024-45554 is a use-after-free vulnerability classified under CWE-416, discovered in various Qualcomm Snapdragon platforms and wireless connectivity modules. The root cause is a race condition on the global maps list during concurrent Subsystem Restart (SSR) execution, leading to memory corruption. This flaw allows an attacker with local privileges to exploit the timing issue to free memory prematurely and subsequently access or manipulate freed memory, potentially resulting in arbitrary code execution or system crashes. The affected products include a broad range of Snapdragon mobile platforms such as Snapdragon 8 Gen 1, Snapdragon 888 series, and multiple FastConnect and wireless connectivity chips. The CVSS v3.1 score is 7.8 (high), reflecting the vulnerability's significant impact on confidentiality, integrity, and availability, with low attack complexity and limited privileges required, but no user interaction needed. Although no known exploits are currently reported in the wild, the vulnerability's nature and affected widespread hardware make it a critical concern for mobile device security. Qualcomm has not yet published patches, emphasizing the need for vigilance and mitigation until updates are available.

Potential Impact

The vulnerability can lead to arbitrary code execution, privilege escalation, or denial of service on affected Snapdragon devices. This threatens the confidentiality of sensitive data, integrity of system operations, and availability of mobile services. Since Snapdragon platforms are widely used in smartphones, tablets, and IoT devices globally, exploitation could compromise millions of devices, enabling attackers to bypass security controls or disrupt device functionality. The local attack vector implies that malware or malicious applications with limited privileges could leverage this flaw to escalate privileges or destabilize the system. This could impact enterprise mobile security, consumer privacy, and critical communications infrastructure relying on affected hardware. The absence of known exploits currently limits immediate widespread impact, but the vulnerability remains a significant risk as exploit development is feasible given the detailed technical information.

Mitigation Recommendations

Organizations and users should monitor Qualcomm advisories closely for official patches and apply them promptly once released. Until patches are available, implement strict local access controls to prevent untrusted code execution on affected devices, including restricting installation of unverified applications and enforcing least privilege principles. Employ mobile device management (MDM) solutions to control app permissions and monitor device behavior for anomalies indicative of exploitation attempts. Network segmentation and endpoint security controls can help limit the spread and impact of potential attacks. Developers should audit concurrent access to shared resources in their code to prevent similar race conditions. Additionally, users should keep device firmware and operating systems up to date and avoid connecting to untrusted networks or installing suspicious software that could exploit this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-09-02T10:26:15.223Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9c2f

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 2/26/2026, 8:20:12 PM

Last updated: 3/26/2026, 8:48:22 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses