Skip to main content

CVE-2024-45574: CWE-129 Improper Validation of Array Index in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2024-45574cvecve-2024-45574cwe-129
Published: Tue May 06 2025 (05/06/2025, 08:32:04 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption during array access in Camera kernel due to invalid index from invalid command data.

AI-Powered Analysis

AILast updated: 07/05/2025, 15:28:03 UTC

Technical Analysis

CVE-2024-45574 is a high-severity vulnerability identified in certain Qualcomm Snapdragon platforms, specifically affecting the Camera kernel component. The root cause is an improper validation of array indices (CWE-129) during array access operations. This occurs when the kernel processes invalid command data that results in an out-of-bounds array index, leading to memory corruption. The affected Snapdragon versions include SDM429W, Snapdragon 429 Mobile Platform, WCN3620, and WCN3660B. The vulnerability can be exploited locally (AV:L) with low attack complexity (AC:L) and requires low privileges (PR:L) but no user interaction (UI:N). The impact scope is unchanged (S:U), but the consequences are severe, affecting confidentiality, integrity, and availability (C:H/I:H/A:H). Memory corruption in the kernel can lead to privilege escalation, arbitrary code execution, or system crashes, potentially allowing an attacker to gain control over the device or disrupt its operation. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on May 6, 2025, and is recognized by CISA as enriched intelligence. Given the kernel-level nature and the critical impact on core device functionality, this vulnerability poses a significant threat to devices using the affected Snapdragon platforms, especially those relying on the camera subsystem.

Potential Impact

For European organizations, the impact of CVE-2024-45574 can be substantial, particularly for enterprises and sectors heavily reliant on mobile devices powered by the affected Qualcomm Snapdragon platforms. These include industries such as telecommunications, mobile device manufacturing, public safety, and critical infrastructure sectors where secure mobile communications and device integrity are paramount. Exploitation could lead to unauthorized access to sensitive data, disruption of mobile services, or compromise of device integrity, which in turn could affect business operations, data privacy compliance (e.g., GDPR), and user trust. Since the vulnerability affects the kernel camera driver, it could also impact applications that rely on camera functionality, including secure authentication methods (facial recognition) and video conferencing tools, which have become essential in remote work environments. The lack of user interaction requirement increases the risk of stealthy exploitation. While no exploits are currently known, the potential for future weaponization means organizations should proactively assess and mitigate risks to avoid operational and reputational damage.

Mitigation Recommendations

1. Immediate mitigation should focus on monitoring for firmware and kernel updates from Qualcomm and device manufacturers that address this vulnerability. Organizations should prioritize patching affected devices as soon as updates become available. 2. Implement strict device management policies to control and limit the installation of untrusted applications that could attempt to exploit this vulnerability locally. 3. Employ mobile threat defense (MTD) solutions that can detect anomalous kernel behavior or memory corruption attempts on devices using affected Snapdragon platforms. 4. Restrict physical and local access to devices, as the attack vector requires local access with low privileges. 5. Conduct regular security audits and vulnerability assessments on mobile device fleets to identify devices running vulnerable Snapdragon versions. 6. Educate users about the risks of installing unauthorized software or connecting to untrusted networks, which could facilitate exploitation. 7. For organizations developing custom software or drivers interacting with the camera subsystem, review code for proper input validation and boundary checks to prevent similar issues. 8. Collaborate with vendors and Qualcomm representatives to obtain early access to patches or mitigations and share threat intelligence within industry groups.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-09-02T10:26:15.225Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9c5d

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 3:28:03 PM

Last updated: 7/31/2025, 6:01:45 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats