Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45577: CWE-20 Improper Input Validation in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2024-45577cvecve-2024-45577cwe-20
Published: Tue May 06 2025 (05/06/2025, 08:32:08 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while invoking IOCTL calls from userspace to camera kernel driver to dump request information.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:22:27 UTC

Technical Analysis

CVE-2024-45577 is a vulnerability classified under CWE-20 (Improper Input Validation) affecting Qualcomm Snapdragon chipsets and related FastConnect and wireless connectivity components. The flaw arises from insufficient validation of input parameters passed via IOCTL (Input/Output Control) calls from userspace applications to the camera kernel driver. This improper validation leads to memory corruption, which can be exploited by a low-privileged attacker to execute arbitrary code or cause denial of service. The affected products include a broad range of Qualcomm platforms such as FastConnect 6900 and 7800, Snapdragon 429 Mobile Platform, Snapdragon 8 Gen 1 Mobile Platform, and several wireless connectivity modules (WCD9380, WCN3620, WCN3660B, WSA8830, WSA8835). The vulnerability has a CVSS v3.1 base score of 7.8, indicating high severity, with attack vector local, low attack complexity, low privileges required, no user interaction, and impacts on confidentiality, integrity, and availability. The vulnerability is particularly concerning because it targets kernel-level drivers, which have elevated privileges and direct hardware access, increasing the potential impact of exploitation. Although no public exploits are known at this time, the widespread deployment of affected Qualcomm components in mobile devices globally makes this a critical issue for device manufacturers and end users alike.

Potential Impact

The exploitation of CVE-2024-45577 can lead to severe consequences for affected devices and organizations. Successful attacks may allow adversaries to execute arbitrary code within the kernel context, leading to full system compromise. This can result in unauthorized access to sensitive data, persistent malware installation, and disruption of device functionality. Given the vulnerability affects camera kernel drivers, attackers might also manipulate or disable camera functions, impacting user privacy and device usability. The broad range of affected Qualcomm platforms means millions of mobile devices worldwide are potentially vulnerable, including smartphones, tablets, and IoT devices using these chipsets. Enterprises relying on mobile devices for sensitive communications or operations could face data breaches or operational disruptions. The local attack vector and low privilege requirement lower the barrier for exploitation, especially in scenarios where attackers have physical or local access to devices. Although no exploits are currently known, the vulnerability's characteristics make it a prime candidate for future exploitation, especially as attackers often target widely deployed mobile platforms.

Mitigation Recommendations

To mitigate CVE-2024-45577, organizations and device manufacturers should prioritize the deployment of security patches from Qualcomm or device vendors as soon as they become available. Until patches are released, it is critical to restrict access to the vulnerable IOCTL interfaces by enforcing strict access controls and limiting local user privileges on affected devices. Employing application whitelisting and monitoring for unusual IOCTL call patterns can help detect potential exploitation attempts. Device users should avoid installing untrusted applications that might attempt to invoke the vulnerable interfaces. For enterprises, implementing mobile device management (MDM) solutions to enforce security policies and control application installations can reduce risk. Additionally, security teams should monitor threat intelligence sources for emerging exploit techniques targeting this vulnerability and prepare incident response plans accordingly. Vendors should also conduct thorough code reviews and fuzz testing on kernel drivers to prevent similar input validation issues in future releases.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-09-02T10:26:15.225Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9c82

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 2/26/2026, 8:22:27 PM

Last updated: 3/25/2026, 1:03:48 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses