Skip to main content

CVE-2024-45579: CWE-20 Improper Input Validation in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2024-45579cvecve-2024-45579cwe-20
Published: Tue May 06 2025 (05/06/2025, 08:32:11 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption may occur when invoking IOCTL calls from userspace to the camera kernel driver to dump request information, due to a missing memory requirement check.

AI-Powered Analysis

AILast updated: 07/05/2025, 15:40:12 UTC

Technical Analysis

CVE-2024-45579 is a high-severity vulnerability affecting multiple Qualcomm Snapdragon platforms and related FastConnect and wireless connectivity chipsets. The root cause is improper input validation (CWE-20) in the camera kernel driver, specifically when handling IOCTL calls from userspace intended to dump request information. The vulnerability arises due to a missing memory requirement check, which can lead to memory corruption. This memory corruption could be exploited by a local attacker with limited privileges (low privileges required) and no user interaction to escalate privileges or cause denial of service. The vulnerability affects a broad range of Qualcomm products including FastConnect 6900 and 7800, Snapdragon 429 Mobile Platform, Snapdragon 8 Gen 1 Mobile Platform, and several wireless connectivity modules (WCD9380, WCN3620, WCN3660B, WSA8830, WSA8835). The CVSS v3.1 score is 7.8 (high), with attack vector local, low attack complexity, privileges required low, no user interaction, and impacts confidentiality, integrity, and availability all rated high. Although no known exploits are currently reported in the wild, the vulnerability's nature and impact make it a significant risk. The flaw allows an attacker to potentially execute arbitrary code or cause system crashes by sending crafted IOCTL requests to the vulnerable camera kernel driver, which is a critical component in mobile devices. This could lead to unauthorized access to sensitive data, device instability, or persistent compromise of affected devices. The vulnerability is particularly relevant for mobile devices and embedded systems using these Qualcomm chipsets, which are widely deployed in smartphones, tablets, and IoT devices globally.

Potential Impact

For European organizations, this vulnerability poses a substantial risk especially for enterprises and government agencies relying on mobile devices powered by affected Qualcomm Snapdragon platforms. The ability to cause memory corruption locally without user interaction and with low privileges means that malicious apps or insiders could exploit this flaw to gain elevated privileges, access sensitive data, or disrupt device availability. This could compromise confidentiality of corporate communications, integrity of stored data, and availability of critical mobile services. Given the widespread use of Snapdragon chipsets in consumer and enterprise mobile devices across Europe, the vulnerability could impact mobile workforce security, secure communications, and IoT deployments. The risk is amplified in sectors with high security requirements such as finance, healthcare, and government, where compromised mobile devices could lead to data breaches or operational disruptions. Additionally, the lack of patches at the time of disclosure increases exposure. The vulnerability could also be leveraged in targeted attacks against European organizations, especially those with mobile device management policies that allow installation of apps or local access to devices.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize the following actions: 1) Identify and inventory all mobile and embedded devices using the affected Qualcomm Snapdragon platforms and related chipsets. 2) Monitor vendor communications for official patches or firmware updates from Qualcomm and device manufacturers; apply these updates promptly once available. 3) Restrict installation of untrusted or unnecessary applications on mobile devices to reduce the risk of local exploitation. 4) Enforce strict mobile device management (MDM) policies that limit local access and privilege escalation capabilities. 5) Employ runtime protection and behavior monitoring on mobile endpoints to detect anomalous IOCTL calls or suspicious kernel interactions. 6) Educate users about the risks of installing apps from untrusted sources and the importance of device updates. 7) For high-security environments, consider additional network segmentation and access controls to limit exposure of vulnerable devices. 8) Engage with device vendors to confirm patch availability and deployment timelines. These steps go beyond generic advice by focusing on device inventory, patch management coordination, and runtime detection specific to kernel driver exploitation vectors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-09-02T10:26:15.227Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9c8a

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 3:40:12 PM

Last updated: 7/28/2025, 1:57:41 PM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats