Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45575: CWE-190 Integer Overflow or Wraparound in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2024-45575cvecve-2024-45575cwe-190
Published: Tue May 06 2025 (05/06/2025, 08:32:06 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption Camera kernel when large number of devices are attached through userspace.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:21:57 UTC

Technical Analysis

CVE-2024-45575 is an integer overflow (CWE-190) vulnerability identified in the camera kernel subsystem of Qualcomm Snapdragon platforms and associated wireless connectivity components. The vulnerability arises when a large number of devices are attached via userspace, causing an integer overflow or wraparound that leads to memory corruption. This memory corruption can be exploited to compromise the kernel's integrity, potentially allowing an attacker with local privileges to execute arbitrary code, escalate privileges, or cause denial of service. The affected products include a wide range of Qualcomm Snapdragon mobile platforms such as Snapdragon 8 Gen 1, Snapdragon 429 Mobile Platform, and FastConnect wireless subsystems (6900, 7800), as well as various wireless connectivity chips (WCD9380, WCN3620, WSA8830, etc.). The CVSS v3.1 base score is 7.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The flaw is rooted in improper handling of integer values during device attachment operations in the kernel, leading to buffer overflows or memory corruption. While no exploits are currently known in the wild, the vulnerability presents a significant risk due to the widespread deployment of affected Snapdragon platforms in smartphones, tablets, and IoT devices globally. Qualcomm has not yet published patches, but the vulnerability has been officially assigned and published, indicating that mitigations will be forthcoming. The vulnerability's exploitation requires local access, which may limit remote exploitation but still poses a serious threat in multi-user or compromised device scenarios.

Potential Impact

The impact of CVE-2024-45575 is substantial for organizations and individuals relying on affected Qualcomm Snapdragon platforms. Successful exploitation can lead to complete compromise of device confidentiality, integrity, and availability by enabling attackers to execute arbitrary code at the kernel level. This could result in unauthorized data access, persistent malware installation, device bricking, or denial of service. Enterprises deploying Snapdragon-based mobile devices or IoT endpoints may face risks of data breaches, espionage, or operational disruption. The vulnerability's local attack vector means that attackers need some form of local access or prior foothold, which could be achieved through other vulnerabilities or physical access. Given the prevalence of Snapdragon chips in consumer and enterprise mobile devices worldwide, the scope of affected systems is large, increasing the potential for widespread exploitation once public exploits emerge. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score underscores the urgency. The vulnerability also poses risks to supply chain security and could be leveraged in targeted attacks against high-value individuals or organizations using affected devices.

Mitigation Recommendations

To mitigate CVE-2024-45575 effectively, organizations should: 1) Monitor Qualcomm and device vendor advisories closely and apply security patches promptly once available. 2) Restrict local access to devices by enforcing strong authentication, device encryption, and endpoint security controls to prevent unauthorized users from gaining local privileges. 3) Employ mobile device management (MDM) solutions to enforce security policies and monitor for suspicious local activity indicative of exploitation attempts. 4) Limit the number of devices attached or connected through userspace interfaces where feasible, reducing the attack surface related to device enumeration. 5) Conduct regular security audits and vulnerability assessments on devices using affected Snapdragon platforms to detect potential exploitation or privilege escalation. 6) Educate users on the risks of installing untrusted applications or granting excessive permissions that could facilitate local privilege escalation. 7) For organizations with critical operations, consider network segmentation and isolation of devices with affected hardware to contain potential compromises. 8) Collaborate with vendors to obtain timely firmware and kernel updates and validate their deployment across the device fleet. These steps go beyond generic advice by focusing on controlling local access vectors and device management practices specific to the vulnerability's exploitation method.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-09-02T10:26:15.225Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9c61

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 2/26/2026, 8:21:57 PM

Last updated: 3/23/2026, 12:21:53 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses