Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45576: CWE-129 Improper Validation of Array Index in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2024-45576cvecve-2024-45576cwe-129
Published: Tue May 06 2025 (05/06/2025, 08:32:07 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while prociesing command buffer buffer in OPE module.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:22:11 UTC

Technical Analysis

CVE-2024-45576 is a vulnerability identified in Qualcomm Snapdragon platforms stemming from improper validation of array indices (CWE-129) within the OPE module's command buffer processing. This weakness allows memory corruption, which can be exploited to achieve arbitrary code execution, elevate privileges, or cause denial of service conditions. The affected products include a wide range of Qualcomm's Snapdragon chipsets and connectivity modules such as FastConnect 6900 and 7800, Snapdragon 429 Mobile Platform, Snapdragon 8 Gen 1 Mobile Platform, and various wearable and wireless connectivity components (e.g., WCD9380, WCN3980, WSA8830). The vulnerability requires local access with low privileges (AV:L, PR:L) but does not require user interaction (UI:N), making it feasible for attackers with limited access to escalate control. The CVSS v3.1 score of 7.8 reflects high severity due to the potential for full compromise of confidentiality, integrity, and availability. No public exploits have been reported yet, but the broad product impact and critical nature of the flaw necessitate urgent attention. The vulnerability was reserved in September 2024 and published in May 2025, with no patches currently linked, indicating a need for close monitoring of vendor updates.

Potential Impact

The vulnerability poses a significant risk to organizations relying on affected Qualcomm Snapdragon platforms, which are widely used in smartphones, wearables, IoT devices, and wireless connectivity modules. Exploitation can lead to unauthorized code execution, data leakage, or device instability, undermining device security and user privacy. For enterprises, this could translate into compromised mobile endpoints, disruption of critical communications, and potential lateral movement within networks if attackers gain footholds via vulnerable devices. The broad range of affected products increases the attack surface, especially in sectors like telecommunications, consumer electronics, healthcare wearables, and automotive systems that integrate Snapdragon components. The requirement for local access limits remote exploitation but does not eliminate risk in environments where devices are shared or physically accessible by attackers. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score underscores the urgency of addressing this flaw to prevent future attacks.

Mitigation Recommendations

Organizations should immediately inventory devices and systems using the affected Qualcomm Snapdragon platforms to assess exposure. Since no official patches are currently linked, it is critical to monitor Qualcomm's security advisories and apply updates as soon as they become available. In the interim, restrict local access to vulnerable devices by enforcing strict physical security controls and limiting user privileges to reduce the risk of exploitation. Employ endpoint detection and response (EDR) solutions to monitor for anomalous behavior indicative of memory corruption or exploitation attempts. Network segmentation can help contain compromised devices and prevent lateral movement. For device manufacturers and integrators, conducting thorough security testing and applying vendor firmware updates promptly is essential. Additionally, educating users about the risks of unauthorized local access and maintaining robust device management policies will help mitigate potential attack vectors.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-09-02T10:26:15.225Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9c65

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 2/26/2026, 8:22:11 PM

Last updated: 3/25/2026, 1:43:52 AM

Views: 94

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses