Skip to main content

CVE-2024-45570: CWE-823 Use of Out-of-range Pointer Offset in Qualcomm, Inc. Snapdragon

Medium
VulnerabilityCVE-2024-45570cvecve-2024-45570cwe-823
Published: Tue May 06 2025 (05/06/2025, 08:32:03 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption may occur during IO configuration processing when the IO port count is invalid.

AI-Powered Analysis

AILast updated: 07/05/2025, 19:26:53 UTC

Technical Analysis

CVE-2024-45570 is a medium severity vulnerability identified in multiple Qualcomm Snapdragon platforms and related chipsets. The underlying issue is a use of an out-of-range pointer offset (CWE-823) during IO configuration processing when the IO port count is invalid. This results in memory corruption, which can potentially lead to unauthorized disclosure of information, partial integrity loss, and limited availability impact. The vulnerability affects a broad range of Qualcomm products, including Snapdragon mobile platforms (e.g., Snapdragon 8 Gen 1, Snapdragon 865 series), FastConnect wireless connectivity modules, various QCA and QCN chipsets, and other specialized platforms such as Qualcomm Video Collaboration and wearable platforms. The CVSS v3.1 base score is 6.6, reflecting a medium severity with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L, indicating that exploitation requires local access with low privileges and no user interaction, but can cause high confidentiality impact, low integrity impact, and low availability impact. Memory corruption vulnerabilities like this can be exploited to leak sensitive data or cause system instability, but the requirement for local access and low privileges reduces the attack surface. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in September 2024 and published in May 2025, indicating recent discovery and disclosure. Given the widespread use of Qualcomm Snapdragon chipsets in mobile devices, IoT, and embedded systems, this vulnerability has broad implications for device security, especially in environments where local access can be obtained by attackers or malicious applications.

Potential Impact

For European organizations, the impact of CVE-2024-45570 depends largely on the deployment of affected Qualcomm Snapdragon-based devices within their infrastructure and user base. Enterprises relying on mobile devices, embedded systems, or IoT devices powered by these chipsets could face risks of data leakage or system instability if attackers gain local access. Confidentiality impact is rated high, meaning sensitive information stored or processed on affected devices could be exposed. Integrity and availability impacts are lower but still present, potentially allowing attackers to cause limited data corruption or service disruption. In sectors such as telecommunications, manufacturing, automotive, and critical infrastructure where Qualcomm chipsets are embedded, this vulnerability could be leveraged for espionage or sabotage if combined with other attack vectors. The requirement for local access and low privileges limits remote exploitation but does not eliminate risk from insider threats, compromised devices, or malicious applications. Given the proliferation of Snapdragon platforms in consumer and enterprise devices across Europe, organizations should consider this vulnerability in their risk assessments and device management policies.

Mitigation Recommendations

1. Monitor Qualcomm and device manufacturers for official patches or firmware updates addressing CVE-2024-45570 and apply them promptly once available. 2. Implement strict device access controls to prevent unauthorized local access, including enforcing strong authentication, device encryption, and endpoint security solutions. 3. Restrict installation of untrusted or unsigned applications on devices using affected Snapdragon platforms to reduce the risk of local exploitation by malicious apps. 4. Employ runtime protection and memory safety tools where possible to detect and prevent exploitation attempts involving memory corruption. 5. Conduct regular security audits and vulnerability assessments on devices incorporating Qualcomm chipsets, focusing on IO configuration and peripheral interfaces. 6. For critical environments, consider network segmentation and device isolation to limit the impact of compromised devices. 7. Educate users and administrators about the risks of local access vulnerabilities and the importance of physical device security. 8. Use mobile device management (MDM) solutions to enforce security policies and monitor device integrity continuously.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-09-02T10:26:15.225Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981cc4522896dcbdaa7e

Added to database: 5/21/2025, 9:08:44 AM

Last enriched: 7/5/2025, 7:26:53 PM

Last updated: 8/17/2025, 11:54:38 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats