CVE-2024-45570: CWE-823 Use of Out-of-range Pointer Offset in Qualcomm, Inc. Snapdragon
Memory corruption may occur during IO configuration processing when the IO port count is invalid.
AI Analysis
Technical Summary
CVE-2024-45570 is a medium severity vulnerability identified in multiple Qualcomm Snapdragon platforms and related chipsets. The underlying issue is a use of an out-of-range pointer offset (CWE-823) during IO configuration processing when the IO port count is invalid. This results in memory corruption, which can potentially lead to unauthorized disclosure of information, partial integrity loss, and limited availability impact. The vulnerability affects a broad range of Qualcomm products, including Snapdragon mobile platforms (e.g., Snapdragon 8 Gen 1, Snapdragon 865 series), FastConnect wireless connectivity modules, various QCA and QCN chipsets, and other specialized platforms such as Qualcomm Video Collaboration and wearable platforms. The CVSS v3.1 base score is 6.6, reflecting a medium severity with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L, indicating that exploitation requires local access with low privileges and no user interaction, but can cause high confidentiality impact, low integrity impact, and low availability impact. Memory corruption vulnerabilities like this can be exploited to leak sensitive data or cause system instability, but the requirement for local access and low privileges reduces the attack surface. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in September 2024 and published in May 2025, indicating recent discovery and disclosure. Given the widespread use of Qualcomm Snapdragon chipsets in mobile devices, IoT, and embedded systems, this vulnerability has broad implications for device security, especially in environments where local access can be obtained by attackers or malicious applications.
Potential Impact
For European organizations, the impact of CVE-2024-45570 depends largely on the deployment of affected Qualcomm Snapdragon-based devices within their infrastructure and user base. Enterprises relying on mobile devices, embedded systems, or IoT devices powered by these chipsets could face risks of data leakage or system instability if attackers gain local access. Confidentiality impact is rated high, meaning sensitive information stored or processed on affected devices could be exposed. Integrity and availability impacts are lower but still present, potentially allowing attackers to cause limited data corruption or service disruption. In sectors such as telecommunications, manufacturing, automotive, and critical infrastructure where Qualcomm chipsets are embedded, this vulnerability could be leveraged for espionage or sabotage if combined with other attack vectors. The requirement for local access and low privileges limits remote exploitation but does not eliminate risk from insider threats, compromised devices, or malicious applications. Given the proliferation of Snapdragon platforms in consumer and enterprise devices across Europe, organizations should consider this vulnerability in their risk assessments and device management policies.
Mitigation Recommendations
1. Monitor Qualcomm and device manufacturers for official patches or firmware updates addressing CVE-2024-45570 and apply them promptly once available. 2. Implement strict device access controls to prevent unauthorized local access, including enforcing strong authentication, device encryption, and endpoint security solutions. 3. Restrict installation of untrusted or unsigned applications on devices using affected Snapdragon platforms to reduce the risk of local exploitation by malicious apps. 4. Employ runtime protection and memory safety tools where possible to detect and prevent exploitation attempts involving memory corruption. 5. Conduct regular security audits and vulnerability assessments on devices incorporating Qualcomm chipsets, focusing on IO configuration and peripheral interfaces. 6. For critical environments, consider network segmentation and device isolation to limit the impact of compromised devices. 7. Educate users and administrators about the risks of local access vulnerabilities and the importance of physical device security. 8. Use mobile device management (MDM) solutions to enforce security policies and monitor device integrity continuously.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2024-45570: CWE-823 Use of Out-of-range Pointer Offset in Qualcomm, Inc. Snapdragon
Description
Memory corruption may occur during IO configuration processing when the IO port count is invalid.
AI-Powered Analysis
Technical Analysis
CVE-2024-45570 is a medium severity vulnerability identified in multiple Qualcomm Snapdragon platforms and related chipsets. The underlying issue is a use of an out-of-range pointer offset (CWE-823) during IO configuration processing when the IO port count is invalid. This results in memory corruption, which can potentially lead to unauthorized disclosure of information, partial integrity loss, and limited availability impact. The vulnerability affects a broad range of Qualcomm products, including Snapdragon mobile platforms (e.g., Snapdragon 8 Gen 1, Snapdragon 865 series), FastConnect wireless connectivity modules, various QCA and QCN chipsets, and other specialized platforms such as Qualcomm Video Collaboration and wearable platforms. The CVSS v3.1 base score is 6.6, reflecting a medium severity with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L, indicating that exploitation requires local access with low privileges and no user interaction, but can cause high confidentiality impact, low integrity impact, and low availability impact. Memory corruption vulnerabilities like this can be exploited to leak sensitive data or cause system instability, but the requirement for local access and low privileges reduces the attack surface. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in September 2024 and published in May 2025, indicating recent discovery and disclosure. Given the widespread use of Qualcomm Snapdragon chipsets in mobile devices, IoT, and embedded systems, this vulnerability has broad implications for device security, especially in environments where local access can be obtained by attackers or malicious applications.
Potential Impact
For European organizations, the impact of CVE-2024-45570 depends largely on the deployment of affected Qualcomm Snapdragon-based devices within their infrastructure and user base. Enterprises relying on mobile devices, embedded systems, or IoT devices powered by these chipsets could face risks of data leakage or system instability if attackers gain local access. Confidentiality impact is rated high, meaning sensitive information stored or processed on affected devices could be exposed. Integrity and availability impacts are lower but still present, potentially allowing attackers to cause limited data corruption or service disruption. In sectors such as telecommunications, manufacturing, automotive, and critical infrastructure where Qualcomm chipsets are embedded, this vulnerability could be leveraged for espionage or sabotage if combined with other attack vectors. The requirement for local access and low privileges limits remote exploitation but does not eliminate risk from insider threats, compromised devices, or malicious applications. Given the proliferation of Snapdragon platforms in consumer and enterprise devices across Europe, organizations should consider this vulnerability in their risk assessments and device management policies.
Mitigation Recommendations
1. Monitor Qualcomm and device manufacturers for official patches or firmware updates addressing CVE-2024-45570 and apply them promptly once available. 2. Implement strict device access controls to prevent unauthorized local access, including enforcing strong authentication, device encryption, and endpoint security solutions. 3. Restrict installation of untrusted or unsigned applications on devices using affected Snapdragon platforms to reduce the risk of local exploitation by malicious apps. 4. Employ runtime protection and memory safety tools where possible to detect and prevent exploitation attempts involving memory corruption. 5. Conduct regular security audits and vulnerability assessments on devices incorporating Qualcomm chipsets, focusing on IO configuration and peripheral interfaces. 6. For critical environments, consider network segmentation and device isolation to limit the impact of compromised devices. 7. Educate users and administrators about the risks of local access vulnerabilities and the importance of physical device security. 8. Use mobile device management (MDM) solutions to enforce security policies and monitor device integrity continuously.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- qualcomm
- Date Reserved
- 2024-09-02T10:26:15.225Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981cc4522896dcbdaa7e
Added to database: 5/21/2025, 9:08:44 AM
Last enriched: 7/5/2025, 7:26:53 PM
Last updated: 8/17/2025, 11:54:38 AM
Views: 18
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.