Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45581: CWE-787: Out-of-bounds Write in Qualcomm, Inc. Snapdragon

0
Medium
VulnerabilityCVE-2024-45581cvecve-2024-45581cwe-787
Published: Tue May 06 2025 (05/06/2025, 08:32:12 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while sound model registration for voice activation with audio kernel driver.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:23:15 UTC

Technical Analysis

CVE-2024-45581 is a vulnerability classified under CWE-787 (Out-of-bounds Write) found in the audio kernel driver of Qualcomm Snapdragon chipsets. The issue arises during the registration of sound models used for voice activation features, where improper bounds checking leads to memory corruption. This memory corruption can be exploited by a local attacker with limited privileges to potentially escalate privileges or cause a denial of service by corrupting kernel memory. The affected Snapdragon versions span a wide range of mobile platforms (e.g., Snapdragon 429 Mobile Platform), automotive modems (e.g., Snapdragon Auto 5G Modem-RF Gen 2), and wireless connectivity chips (e.g., WCN3620). The vulnerability does not require user interaction but does require local access with some privileges, making remote exploitation unlikely without prior compromise. The CVSS v3.1 score of 6.6 indicates a medium severity with high confidentiality impact, low integrity, and low availability impact. No public exploits have been reported yet, and Qualcomm has not published patches at the time of this report. The vulnerability was reserved in September 2024 and published in May 2025, indicating a recent discovery and disclosure. Given the broad deployment of affected chipsets in smartphones, automotive systems, and IoT devices, this vulnerability poses a significant risk if exploited in targeted attacks.

Potential Impact

The primary impact of CVE-2024-45581 is the potential for local attackers to corrupt kernel memory, leading to privilege escalation or denial of service on devices using affected Snapdragon chipsets. This can compromise the confidentiality of sensitive data processed by the device, such as voice activation commands or other user inputs. While the integrity and availability impacts are rated low, successful exploitation could allow attackers to bypass security controls, gain elevated privileges, or crash critical system components. This is particularly concerning for mobile devices, automotive systems, and IoT devices where Snapdragon chipsets are prevalent. Organizations relying on these platforms for sensitive communications, automotive safety, or industrial control could face operational disruptions or data breaches. The requirement for local privileges limits the attack surface but does not eliminate risk, especially in environments where devices may be physically accessible or already partially compromised. The absence of known exploits in the wild reduces immediate threat but does not preclude future targeted attacks. Overall, the vulnerability could undermine trust in affected devices and necessitate urgent remediation in high-risk environments.

Mitigation Recommendations

1. Monitor Qualcomm and device vendor advisories closely for official patches addressing CVE-2024-45581 and apply them promptly once available. 2. Implement strict access controls on devices to limit local user privileges, especially restricting access to kernel-level operations and audio driver interfaces. 3. Employ device hardening techniques such as kernel address space layout randomization (KASLR) and memory protection mechanisms to reduce exploitation likelihood. 4. Use mobile device management (MDM) solutions to enforce security policies and restrict installation of untrusted applications that could leverage local privilege escalation. 5. For automotive and IoT deployments, segment networks and restrict physical access to devices to minimize risk of local attacks. 6. Conduct regular security audits and penetration testing focusing on local privilege escalation vectors. 7. Educate users and administrators about the risks of granting unnecessary local privileges and the importance of timely updates. 8. Consider deploying runtime protection tools that can detect anomalous kernel memory writes or crashes related to audio driver operations. These targeted measures go beyond generic patching advice and address the specific exploitation vectors and environments relevant to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-09-02T10:26:15.227Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9c8e

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 2/26/2026, 8:23:15 PM

Last updated: 3/25/2026, 6:12:33 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses