CVE-2024-49830: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon
Memory corruption while processing an IOCTL call to set mixer controls.
AI Analysis
Technical Summary
CVE-2024-49830 is a classic buffer overflow vulnerability (CWE-120) identified in Qualcomm Snapdragon chipsets, specifically triggered during the processing of an IOCTL call that sets mixer controls. The vulnerability arises from a failure to properly check the size of input data before copying it into a buffer, leading to memory corruption. This flaw affects multiple Snapdragon variants including QCA6574AU, QCA6595AU, QCA6678AQ, QCA6688AQ, QCA6698AQ, QCA9367, QCA9377, SDM429W, Snapdragon 429 Mobile Platform, Snapdragon Auto 5G Modem-RF Gen 2, WCN3620, and WCN3660B. The vulnerability requires an attacker to have local access with low privileges (PR:L) but does not require user interaction (UI:N). The impact includes high confidentiality loss, low integrity impact, and low availability impact, as indicated by the CVSS vector (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L). Memory corruption could allow an attacker to read sensitive data or potentially execute arbitrary code, though exploitation complexity is moderate due to the need for local access and low privileges. No public exploits are known at this time, but the vulnerability is publicly disclosed and assigned a CVSS score of 6.6, categorizing it as medium severity. The vulnerability affects a broad range of devices, including mobile phones, automotive systems, and IoT devices that utilize these Snapdragon chipsets.
Potential Impact
The vulnerability poses a significant risk to organizations and individuals using devices powered by affected Qualcomm Snapdragon chipsets. Exploitation could lead to unauthorized disclosure of sensitive information due to high confidentiality impact. Although integrity and availability impacts are lower, memory corruption can cause system instability or crashes, potentially leading to denial of service. Since the attack requires local access with low privileges, threat actors with physical or local network access could exploit this flaw to escalate their capabilities or extract sensitive data. This is particularly concerning for environments with shared device access or where devices are deployed in critical infrastructure such as automotive systems or enterprise IoT. The widespread use of Snapdragon chipsets in smartphones and automotive platforms means that a large number of devices globally could be affected, increasing the potential attack surface. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as exploit development could emerge following public disclosure.
Mitigation Recommendations
Organizations should implement a multi-layered mitigation strategy. First, restrict local access to devices using affected Snapdragon chipsets by enforcing strong physical security controls and limiting user privileges to reduce the attack surface. Network segmentation and device access controls can help prevent unauthorized local network access. Monitor device logs and behavior for signs of abnormal activity or crashes that may indicate exploitation attempts. Since no patches are currently available, maintain close communication with Qualcomm and device manufacturers for timely updates and firmware patches. Once patches are released, prioritize their deployment in all affected devices, especially those in critical or sensitive environments. Additionally, consider employing runtime protections such as memory protection mechanisms (e.g., DEP, ASLR) where supported by the device firmware to mitigate exploitation attempts. For automotive and IoT deployments, ensure secure update mechanisms are in place to facilitate rapid patching. Finally, educate users and administrators about the risks of local exploitation and the importance of maintaining device security hygiene.
Affected Countries
United States, China, India, South Korea, Japan, Germany, United Kingdom, France, Brazil, Russia, Canada, Australia, Mexico, Italy
CVE-2024-49830: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon
Description
Memory corruption while processing an IOCTL call to set mixer controls.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-49830 is a classic buffer overflow vulnerability (CWE-120) identified in Qualcomm Snapdragon chipsets, specifically triggered during the processing of an IOCTL call that sets mixer controls. The vulnerability arises from a failure to properly check the size of input data before copying it into a buffer, leading to memory corruption. This flaw affects multiple Snapdragon variants including QCA6574AU, QCA6595AU, QCA6678AQ, QCA6688AQ, QCA6698AQ, QCA9367, QCA9377, SDM429W, Snapdragon 429 Mobile Platform, Snapdragon Auto 5G Modem-RF Gen 2, WCN3620, and WCN3660B. The vulnerability requires an attacker to have local access with low privileges (PR:L) but does not require user interaction (UI:N). The impact includes high confidentiality loss, low integrity impact, and low availability impact, as indicated by the CVSS vector (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L). Memory corruption could allow an attacker to read sensitive data or potentially execute arbitrary code, though exploitation complexity is moderate due to the need for local access and low privileges. No public exploits are known at this time, but the vulnerability is publicly disclosed and assigned a CVSS score of 6.6, categorizing it as medium severity. The vulnerability affects a broad range of devices, including mobile phones, automotive systems, and IoT devices that utilize these Snapdragon chipsets.
Potential Impact
The vulnerability poses a significant risk to organizations and individuals using devices powered by affected Qualcomm Snapdragon chipsets. Exploitation could lead to unauthorized disclosure of sensitive information due to high confidentiality impact. Although integrity and availability impacts are lower, memory corruption can cause system instability or crashes, potentially leading to denial of service. Since the attack requires local access with low privileges, threat actors with physical or local network access could exploit this flaw to escalate their capabilities or extract sensitive data. This is particularly concerning for environments with shared device access or where devices are deployed in critical infrastructure such as automotive systems or enterprise IoT. The widespread use of Snapdragon chipsets in smartphones and automotive platforms means that a large number of devices globally could be affected, increasing the potential attack surface. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as exploit development could emerge following public disclosure.
Mitigation Recommendations
Organizations should implement a multi-layered mitigation strategy. First, restrict local access to devices using affected Snapdragon chipsets by enforcing strong physical security controls and limiting user privileges to reduce the attack surface. Network segmentation and device access controls can help prevent unauthorized local network access. Monitor device logs and behavior for signs of abnormal activity or crashes that may indicate exploitation attempts. Since no patches are currently available, maintain close communication with Qualcomm and device manufacturers for timely updates and firmware patches. Once patches are released, prioritize their deployment in all affected devices, especially those in critical or sensitive environments. Additionally, consider employing runtime protections such as memory protection mechanisms (e.g., DEP, ASLR) where supported by the device firmware to mitigate exploitation attempts. For automotive and IoT deployments, ensure secure update mechanisms are in place to facilitate rapid patching. Finally, educate users and administrators about the risks of local exploitation and the importance of maintaining device security hygiene.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- qualcomm
- Date Reserved
- 2024-10-20T17:18:43.214Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981bc4522896dcbd9c9a
Added to database: 5/21/2025, 9:08:43 AM
Last enriched: 2/26/2026, 8:25:22 PM
Last updated: 3/24/2026, 8:37:40 PM
Views: 53
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.