Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45557: CWE-823 Use of Out-of-range Pointer Offset in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2024-45557cvecve-2024-45557cwe-823
Published: Mon Apr 07 2025 (04/07/2025, 10:15:48 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption can occur when TME processes addresses from TZ and MPSS requests without proper validation.

AI-Powered Analysis

AILast updated: 02/26/2026, 19:43:29 UTC

Technical Analysis

CVE-2024-45557 is a vulnerability classified under CWE-823 (Use of Out-of-range Pointer Offset) affecting numerous Qualcomm Snapdragon chipsets and associated components. The root cause is the TrustZone Memory Engine (TME) processing addresses from TrustZone (TZ) and Modem Processor SubSystem (MPSS) requests without adequate validation, leading to potential memory corruption. This flaw allows an attacker with limited privileges on the device to manipulate pointer offsets beyond their intended range, causing corruption of memory regions. The affected products span a wide array of Qualcomm hardware, including Snapdragon mobile platforms (e.g., Snapdragon 8 Gen 1, 8 Gen 3, 4 Gen 2), modem-RF systems (e.g., Snapdragon X35, X72, X75), and wireless connectivity modules (e.g., FastConnect series, WCD and WSA series). The vulnerability does not require user interaction but does require local privileges, making it exploitable by malicious applications or processes running on the device. The CVSS v3.1 score of 7.8 reflects high impact on confidentiality, integrity, and availability, with low attack complexity and low privileges required. No public exploits or patches are currently available, but the broad range of affected hardware and the critical nature of memory corruption vulnerabilities in trusted execution environments make this a significant threat. The vulnerability could be leveraged to escalate privileges, execute arbitrary code, or cause denial of service, undermining device security and user data protection.

Potential Impact

The impact of CVE-2024-45557 is substantial due to the critical role Qualcomm Snapdragon chipsets play in billions of mobile and embedded devices globally. Successful exploitation can lead to memory corruption, which may result in privilege escalation, arbitrary code execution, or denial of service. This compromises device confidentiality, integrity, and availability, potentially allowing attackers to bypass security mechanisms enforced by TrustZone, a hardware-based security technology designed to isolate sensitive operations. The vulnerability affects mobile phones, IoT devices, automotive systems, and other embedded platforms using affected Snapdragon components. Organizations relying on these devices for sensitive communications, financial transactions, or critical infrastructure control face increased risk of data breaches, service disruptions, and loss of user trust. The requirement for local privileges limits remote exploitation but does not eliminate risk, especially in environments where malicious apps or insiders have access. The lack of known exploits in the wild currently reduces immediate threat but does not diminish the urgency for mitigation given the vulnerability’s severity and broad impact scope.

Mitigation Recommendations

To mitigate CVE-2024-45557, organizations and device manufacturers should: 1) Monitor Qualcomm and device vendor advisories closely for official patches and firmware updates addressing this vulnerability and apply them promptly once available. 2) Implement strict application sandboxing and privilege separation to reduce the risk of local privilege escalation by untrusted applications. 3) Employ runtime protections such as memory integrity checks and exploit mitigation techniques (e.g., Control Flow Integrity, Address Space Layout Randomization) where supported by the platform. 4) Limit installation of untrusted or unnecessary applications to reduce attack surface. 5) For enterprise-managed devices, enforce mobile device management (MDM) policies that restrict local access and privilege escalation attempts. 6) Conduct regular security audits and penetration testing focused on local privilege escalation vectors. 7) Educate users about the risks of installing unverified apps and the importance of timely updates. These steps, combined with vendor patches, will help reduce the risk posed by this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2024-09-02T10:26:15.223Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a1b885912abc71d0a0ca

Added to database: 2/26/2026, 7:40:40 PM

Last enriched: 2/26/2026, 7:43:29 PM

Last updated: 2/26/2026, 11:18:30 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses