Skip to main content

CVE-2024-45567: CWE-416 Use After Free in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2024-45567cvecve-2024-45567cwe-416
Published: Tue May 06 2025 (05/06/2025, 08:32:01 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while encoding JPEG format.

AI-Powered Analysis

AILast updated: 07/05/2025, 15:27:34 UTC

Technical Analysis

CVE-2024-45567 is a high-severity use-after-free vulnerability (CWE-416) identified in various Qualcomm Snapdragon components, including FastConnect 6900 and 7800, Snapdragon 429 Mobile Platform, Snapdragon 8 Gen 1 Mobile Platform, and several wireless connectivity chips (e.g., WCD9380, WCN3620). The vulnerability arises from memory corruption during the encoding of JPEG images, where a use-after-free condition occurs. This means that the software attempts to access memory after it has been freed, potentially leading to arbitrary code execution, privilege escalation, or denial of service. The CVSS 3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity, requiring low privileges but no user interaction. Exploitation could allow an attacker with limited privileges on the device to execute arbitrary code or cause system instability. Although no known exploits are currently reported in the wild, the affected Snapdragon platforms are widely used in mobile devices, IoT, and embedded systems, making this vulnerability significant. The lack of available patches at the time of publication increases the urgency for mitigation and monitoring.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially those relying on mobile devices, embedded systems, or IoT devices powered by affected Qualcomm Snapdragon components. Potential impacts include unauthorized access to sensitive data, disruption of critical services, and compromise of device integrity. Enterprises in sectors such as telecommunications, finance, healthcare, and government could face data breaches or operational disruptions if attackers exploit this flaw. The high confidentiality, integrity, and availability impacts mean that sensitive communications and data processed on vulnerable devices could be exposed or manipulated. Additionally, the vulnerability could be leveraged as a foothold for lateral movement within corporate networks if exploited on employee devices. Given the widespread use of Snapdragon chips in consumer and enterprise mobile devices, the threat surface is broad, and the impact could extend to supply chain security and endpoint protection strategies.

Mitigation Recommendations

1. Immediate mitigation should focus on inventorying all devices using the affected Qualcomm Snapdragon components within the organization. 2. Apply vendor-provided patches as soon as they become available; monitor Qualcomm and device manufacturers for updates. 3. Implement strict device usage policies, restricting installation of untrusted applications that could trigger JPEG encoding processes. 4. Employ endpoint detection and response (EDR) solutions capable of monitoring anomalous memory usage patterns indicative of use-after-free exploitation. 5. Network segmentation and least privilege principles should be enforced to limit the impact of a compromised device. 6. For critical environments, consider disabling or limiting JPEG encoding features if feasible until patches are applied. 7. Regularly update device firmware and operating systems to reduce exposure to known vulnerabilities. 8. Conduct user awareness training to recognize suspicious device behavior or application anomalies related to image processing.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-09-02T10:26:15.224Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9c55

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 3:27:34 PM

Last updated: 7/26/2025, 4:58:35 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats