CVE-2024-45557: CWE-823 Use of Out-of-range Pointer Offset in Qualcomm, Inc. Snapdragon
Memory corruption can occur when TME processes addresses from TZ and MPSS requests without proper validation.
AI Analysis
Technical Summary
CVE-2024-45557 is a vulnerability classified under CWE-823 (Use of Out-of-range Pointer Offset) affecting numerous Qualcomm Snapdragon chipsets and associated components. The root cause is the TrustZone Memory Engine (TME) processing addresses from TrustZone (TZ) and Modem Processor SubSystem (MPSS) requests without adequate validation, leading to potential memory corruption. This flaw allows an attacker with limited privileges on the device to manipulate pointer offsets beyond their intended range, causing corruption of memory regions. The affected products span a wide array of Qualcomm hardware, including Snapdragon mobile platforms (e.g., Snapdragon 8 Gen 1, 8 Gen 3, 4 Gen 2), modem-RF systems (e.g., Snapdragon X35, X72, X75), and wireless connectivity modules (e.g., FastConnect series, WCD and WSA series). The vulnerability does not require user interaction but does require local privileges, making it exploitable by malicious applications or processes running on the device. The CVSS v3.1 score of 7.8 reflects high impact on confidentiality, integrity, and availability, with low attack complexity and low privileges required. No public exploits or patches are currently available, but the broad range of affected hardware and the critical nature of memory corruption vulnerabilities in trusted execution environments make this a significant threat. The vulnerability could be leveraged to escalate privileges, execute arbitrary code, or cause denial of service, undermining device security and user data protection.
Potential Impact
The impact of CVE-2024-45557 is substantial due to the critical role Qualcomm Snapdragon chipsets play in billions of mobile and embedded devices globally. Successful exploitation can lead to memory corruption, which may result in privilege escalation, arbitrary code execution, or denial of service. This compromises device confidentiality, integrity, and availability, potentially allowing attackers to bypass security mechanisms enforced by TrustZone, a hardware-based security technology designed to isolate sensitive operations. The vulnerability affects mobile phones, IoT devices, automotive systems, and other embedded platforms using affected Snapdragon components. Organizations relying on these devices for sensitive communications, financial transactions, or critical infrastructure control face increased risk of data breaches, service disruptions, and loss of user trust. The requirement for local privileges limits remote exploitation but does not eliminate risk, especially in environments where malicious apps or insiders have access. The lack of known exploits in the wild currently reduces immediate threat but does not diminish the urgency for mitigation given the vulnerability’s severity and broad impact scope.
Mitigation Recommendations
To mitigate CVE-2024-45557, organizations and device manufacturers should: 1) Monitor Qualcomm and device vendor advisories closely for official patches and firmware updates addressing this vulnerability and apply them promptly once available. 2) Implement strict application sandboxing and privilege separation to reduce the risk of local privilege escalation by untrusted applications. 3) Employ runtime protections such as memory integrity checks and exploit mitigation techniques (e.g., Control Flow Integrity, Address Space Layout Randomization) where supported by the platform. 4) Limit installation of untrusted or unnecessary applications to reduce attack surface. 5) For enterprise-managed devices, enforce mobile device management (MDM) policies that restrict local access and privilege escalation attempts. 6) Conduct regular security audits and penetration testing focused on local privilege escalation vectors. 7) Educate users about the risks of installing unverified apps and the importance of timely updates. These steps, combined with vendor patches, will help reduce the risk posed by this vulnerability.
Affected Countries
United States, China, India, South Korea, Japan, Germany, United Kingdom, France, Brazil, Russia, Canada, Australia, Mexico, Indonesia, Vietnam
CVE-2024-45557: CWE-823 Use of Out-of-range Pointer Offset in Qualcomm, Inc. Snapdragon
Description
Memory corruption can occur when TME processes addresses from TZ and MPSS requests without proper validation.
AI-Powered Analysis
Technical Analysis
CVE-2024-45557 is a vulnerability classified under CWE-823 (Use of Out-of-range Pointer Offset) affecting numerous Qualcomm Snapdragon chipsets and associated components. The root cause is the TrustZone Memory Engine (TME) processing addresses from TrustZone (TZ) and Modem Processor SubSystem (MPSS) requests without adequate validation, leading to potential memory corruption. This flaw allows an attacker with limited privileges on the device to manipulate pointer offsets beyond their intended range, causing corruption of memory regions. The affected products span a wide array of Qualcomm hardware, including Snapdragon mobile platforms (e.g., Snapdragon 8 Gen 1, 8 Gen 3, 4 Gen 2), modem-RF systems (e.g., Snapdragon X35, X72, X75), and wireless connectivity modules (e.g., FastConnect series, WCD and WSA series). The vulnerability does not require user interaction but does require local privileges, making it exploitable by malicious applications or processes running on the device. The CVSS v3.1 score of 7.8 reflects high impact on confidentiality, integrity, and availability, with low attack complexity and low privileges required. No public exploits or patches are currently available, but the broad range of affected hardware and the critical nature of memory corruption vulnerabilities in trusted execution environments make this a significant threat. The vulnerability could be leveraged to escalate privileges, execute arbitrary code, or cause denial of service, undermining device security and user data protection.
Potential Impact
The impact of CVE-2024-45557 is substantial due to the critical role Qualcomm Snapdragon chipsets play in billions of mobile and embedded devices globally. Successful exploitation can lead to memory corruption, which may result in privilege escalation, arbitrary code execution, or denial of service. This compromises device confidentiality, integrity, and availability, potentially allowing attackers to bypass security mechanisms enforced by TrustZone, a hardware-based security technology designed to isolate sensitive operations. The vulnerability affects mobile phones, IoT devices, automotive systems, and other embedded platforms using affected Snapdragon components. Organizations relying on these devices for sensitive communications, financial transactions, or critical infrastructure control face increased risk of data breaches, service disruptions, and loss of user trust. The requirement for local privileges limits remote exploitation but does not eliminate risk, especially in environments where malicious apps or insiders have access. The lack of known exploits in the wild currently reduces immediate threat but does not diminish the urgency for mitigation given the vulnerability’s severity and broad impact scope.
Mitigation Recommendations
To mitigate CVE-2024-45557, organizations and device manufacturers should: 1) Monitor Qualcomm and device vendor advisories closely for official patches and firmware updates addressing this vulnerability and apply them promptly once available. 2) Implement strict application sandboxing and privilege separation to reduce the risk of local privilege escalation by untrusted applications. 3) Employ runtime protections such as memory integrity checks and exploit mitigation techniques (e.g., Control Flow Integrity, Address Space Layout Randomization) where supported by the platform. 4) Limit installation of untrusted or unnecessary applications to reduce attack surface. 5) For enterprise-managed devices, enforce mobile device management (MDM) policies that restrict local access and privilege escalation attempts. 6) Conduct regular security audits and penetration testing focused on local privilege escalation vectors. 7) Educate users about the risks of installing unverified apps and the importance of timely updates. These steps, combined with vendor patches, will help reduce the risk posed by this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- qualcomm
- Date Reserved
- 2024-09-02T10:26:15.223Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a0a1b885912abc71d0a0ca
Added to database: 2/26/2026, 7:40:40 PM
Last enriched: 2/26/2026, 7:43:29 PM
Last updated: 2/26/2026, 11:18:30 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3268: Improper Access Controls in psi-probe PSI Probe
MediumCVE-2026-28280: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jmpsec osctrl
MediumCVE-2026-28279: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in jmpsec osctrl
HighCVE-2026-28276: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Morelitea initiative
HighCVE-2026-28275: CWE-613: Insufficient Session Expiration in Morelitea initiative
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.