CVE-2024-45575: CWE-190 Integer Overflow or Wraparound in Qualcomm, Inc. Snapdragon
Memory corruption Camera kernel when large number of devices are attached through userspace.
AI Analysis
Technical Summary
CVE-2024-45575 is a high-severity integer overflow vulnerability (CWE-190) affecting multiple Qualcomm Snapdragon platforms and associated components, including FastConnect 6900 and 7800, Snapdragon 429 Mobile Platform, Snapdragon 8 Gen 1 Mobile Platform, and various wireless connectivity chips (e.g., WCD9380, WCN3620). The vulnerability arises in the camera kernel subsystem when a large number of devices are attached through userspace, leading to an integer overflow or wraparound condition. This flaw can cause memory corruption, potentially allowing an attacker with limited privileges (local access with low privileges) to escalate their privileges or execute arbitrary code within the kernel context. The CVSS v3.1 score of 7.8 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction required. The vulnerability requires local privileges but no user interaction, and the scope is unchanged, meaning the impact is confined to the vulnerable component. Although no known exploits are currently in the wild, the vulnerability's nature and affected platforms make it a significant risk, especially given the widespread use of Snapdragon chips in mobile and embedded devices. The lack of available patches at the time of publication increases the urgency for affected parties to monitor for updates and apply mitigations.
Potential Impact
For European organizations, the impact of CVE-2024-45575 is substantial, particularly for those relying on mobile devices, IoT, or embedded systems powered by affected Qualcomm Snapdragon platforms. Exploitation could lead to unauthorized access to sensitive data, disruption of device functionality, or persistent compromise of devices used within corporate networks. This can affect confidentiality (data leakage), integrity (unauthorized code execution), and availability (device crashes or denial of service). Industries such as telecommunications, finance, healthcare, and critical infrastructure that utilize Snapdragon-based devices for communication or operational technology are at heightened risk. Moreover, the vulnerability could be leveraged as a foothold for lateral movement within networks if devices are used as entry points. Given the prevalence of Snapdragon chips in smartphones and connected devices, the threat extends to mobile workforce security and BYOD policies, potentially exposing corporate resources to compromise.
Mitigation Recommendations
1. Immediate mitigation involves restricting local access to devices running affected Snapdragon platforms, limiting the number of devices attached through userspace to reduce the risk of triggering the integer overflow condition. 2. Implement strict access controls and monitoring on devices to detect unusual attachment patterns or kernel-level anomalies. 3. Deploy endpoint detection and response (EDR) solutions capable of monitoring kernel integrity and suspicious memory corruption events. 4. Coordinate with device manufacturers and Qualcomm for timely patch deployment once available; prioritize patching for devices in critical roles or handling sensitive data. 5. For organizations managing fleets of mobile or embedded devices, enforce device management policies that restrict installation of untrusted applications and limit privilege escalation capabilities. 6. Conduct regular security audits and penetration testing focusing on kernel-level vulnerabilities and privilege escalation paths. 7. Educate users and administrators about the risks of local privilege exploitation and the importance of device hygiene to prevent unauthorized local access.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Finland, Poland, Belgium
CVE-2024-45575: CWE-190 Integer Overflow or Wraparound in Qualcomm, Inc. Snapdragon
Description
Memory corruption Camera kernel when large number of devices are attached through userspace.
AI-Powered Analysis
Technical Analysis
CVE-2024-45575 is a high-severity integer overflow vulnerability (CWE-190) affecting multiple Qualcomm Snapdragon platforms and associated components, including FastConnect 6900 and 7800, Snapdragon 429 Mobile Platform, Snapdragon 8 Gen 1 Mobile Platform, and various wireless connectivity chips (e.g., WCD9380, WCN3620). The vulnerability arises in the camera kernel subsystem when a large number of devices are attached through userspace, leading to an integer overflow or wraparound condition. This flaw can cause memory corruption, potentially allowing an attacker with limited privileges (local access with low privileges) to escalate their privileges or execute arbitrary code within the kernel context. The CVSS v3.1 score of 7.8 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction required. The vulnerability requires local privileges but no user interaction, and the scope is unchanged, meaning the impact is confined to the vulnerable component. Although no known exploits are currently in the wild, the vulnerability's nature and affected platforms make it a significant risk, especially given the widespread use of Snapdragon chips in mobile and embedded devices. The lack of available patches at the time of publication increases the urgency for affected parties to monitor for updates and apply mitigations.
Potential Impact
For European organizations, the impact of CVE-2024-45575 is substantial, particularly for those relying on mobile devices, IoT, or embedded systems powered by affected Qualcomm Snapdragon platforms. Exploitation could lead to unauthorized access to sensitive data, disruption of device functionality, or persistent compromise of devices used within corporate networks. This can affect confidentiality (data leakage), integrity (unauthorized code execution), and availability (device crashes or denial of service). Industries such as telecommunications, finance, healthcare, and critical infrastructure that utilize Snapdragon-based devices for communication or operational technology are at heightened risk. Moreover, the vulnerability could be leveraged as a foothold for lateral movement within networks if devices are used as entry points. Given the prevalence of Snapdragon chips in smartphones and connected devices, the threat extends to mobile workforce security and BYOD policies, potentially exposing corporate resources to compromise.
Mitigation Recommendations
1. Immediate mitigation involves restricting local access to devices running affected Snapdragon platforms, limiting the number of devices attached through userspace to reduce the risk of triggering the integer overflow condition. 2. Implement strict access controls and monitoring on devices to detect unusual attachment patterns or kernel-level anomalies. 3. Deploy endpoint detection and response (EDR) solutions capable of monitoring kernel integrity and suspicious memory corruption events. 4. Coordinate with device manufacturers and Qualcomm for timely patch deployment once available; prioritize patching for devices in critical roles or handling sensitive data. 5. For organizations managing fleets of mobile or embedded devices, enforce device management policies that restrict installation of untrusted applications and limit privilege escalation capabilities. 6. Conduct regular security audits and penetration testing focusing on kernel-level vulnerabilities and privilege escalation paths. 7. Educate users and administrators about the risks of local privilege exploitation and the importance of device hygiene to prevent unauthorized local access.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- qualcomm
- Date Reserved
- 2024-09-02T10:26:15.225Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981bc4522896dcbd9c61
Added to database: 5/21/2025, 9:08:43 AM
Last enriched: 7/5/2025, 3:28:17 PM
Last updated: 8/17/2025, 6:33:01 PM
Views: 9
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.