Skip to main content

CVE-2024-49835: CWE-787: Out-of-bounds Write in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2024-49835cvecve-2024-49835cwe-787
Published: Tue May 06 2025 (05/06/2025, 08:32:17 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while reading secure file.

AI-Powered Analysis

AILast updated: 07/05/2025, 15:41:33 UTC

Technical Analysis

CVE-2024-49835 is a high-severity vulnerability classified under CWE-787, indicating an out-of-bounds write condition within Qualcomm Snapdragon components. The vulnerability arises due to memory corruption occurring while reading a secure file, which suggests improper bounds checking or validation during file processing. This flaw affects a broad range of Qualcomm Snapdragon products, including numerous mobile platforms (e.g., Snapdragon 8 Gen 1, 865, 888 series), FastConnect wireless subsystems, modem-RF systems, compute platforms, audio platforms, and video collaboration platforms. The extensive list of affected versions spans many generations of Snapdragon chipsets and related components, highlighting the widespread impact potential. The CVSS v3.1 base score is 7.8, reflecting a high severity with vector metrics indicating local attack vector (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). This means an attacker with local access and low privileges could exploit this vulnerability without user interaction to cause significant damage, including potential arbitrary code execution or system compromise. No known exploits are currently reported in the wild, and no patches are linked yet, indicating that mitigation and remediation efforts may still be in progress or forthcoming. The vulnerability is particularly critical because Snapdragon chipsets are widely used in mobile devices, IoT, automotive, and embedded systems, making exploitation potentially impactful across many device categories.

Potential Impact

For European organizations, the impact of CVE-2024-49835 is significant due to the widespread use of Qualcomm Snapdragon chipsets in smartphones, tablets, automotive infotainment systems, industrial IoT devices, and enterprise mobile hardware. Confidentiality breaches could expose sensitive corporate data, intellectual property, or personal information of employees and customers. Integrity violations could allow attackers to alter device firmware or software, potentially implanting persistent malware or backdoors. Availability impacts could disrupt critical communications or operational technology systems relying on affected hardware. Given the local attack vector, physical or local network access might be required, but many enterprise environments have Bring Your Own Device (BYOD) policies or remote access scenarios where attackers could leverage this vulnerability. The high impact on all three security pillars (confidentiality, integrity, availability) elevates the risk for sectors such as finance, healthcare, manufacturing, and government agencies in Europe. Additionally, the automotive and industrial sectors in Europe, which increasingly rely on Snapdragon-based platforms for connectivity and control, face risks of operational disruption or safety hazards if exploited.

Mitigation Recommendations

1. Immediate inventory and identification of all devices and systems using affected Qualcomm Snapdragon components within the organization, including mobile devices, IoT endpoints, automotive systems, and embedded platforms. 2. Monitor Qualcomm and device vendors for official patches or firmware updates addressing CVE-2024-49835 and prioritize rapid deployment once available. 3. Implement strict access controls to limit local access to devices, including physical security measures and network segmentation to reduce the attack surface. 4. Employ endpoint detection and response (EDR) solutions capable of detecting anomalous memory corruption or exploitation attempts targeting Snapdragon platforms. 5. For mobile device management (MDM) environments, enforce policies restricting installation of untrusted applications and ensure devices are updated with the latest security patches. 6. Collaborate with supply chain partners and vendors to confirm patch status and mitigation strategies for embedded or automotive systems using affected chipsets. 7. Conduct targeted penetration testing and vulnerability assessments focusing on local privilege escalation and memory corruption exploits on Snapdragon-based devices. 8. Educate IT and security teams about the specific risks of local exploitation and the importance of layered defenses, including endpoint hardening and network controls.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-10-20T17:18:43.215Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9c9e

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 3:41:33 PM

Last updated: 8/7/2025, 4:32:51 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats