Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-49836: CWE-129 Improper Validation of Array Index in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2024-49836cvecve-2024-49836cwe-129
Published: Mon Mar 03 2025 (03/03/2025, 10:07:31 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption may occur during the synchronization of the camera`s frame processing pipeline.

AI-Powered Analysis

AILast updated: 02/26/2026, 21:16:29 UTC

Technical Analysis

CVE-2024-49836 is a vulnerability identified in multiple Qualcomm Snapdragon platforms, including FastConnect modules, Snapdragon 429 Mobile Platform, Snapdragon 8 Gen 3 Mobile Platform, and various wireless connectivity chips (WCD, WCN, WSA series). The root cause is improper validation of array indices (CWE-129) during synchronization of the camera's frame processing pipeline, which can result in memory corruption. This memory corruption could lead to arbitrary code execution, privilege escalation, or denial of service by corrupting critical memory structures. The vulnerability requires local access with low privileges (AV:L/PR:L), no user interaction (UI:N), and has low attack complexity (AC:L). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), reflecting the potential for significant compromise of device security. The flaw affects a wide range of Qualcomm products used in smartphones, IoT devices, and wireless communication hardware, making it broadly impactful. No public exploits have been reported yet, but the vulnerability's nature and affected components suggest it could be leveraged in targeted attacks or by malware with local access. Qualcomm has published the vulnerability but has not yet released patches, emphasizing the need for vigilance and proactive mitigation.

Potential Impact

The impact of CVE-2024-49836 is substantial for organizations and individuals using devices with affected Qualcomm Snapdragon components. Successful exploitation can lead to full compromise of device confidentiality, integrity, and availability, enabling attackers to execute arbitrary code, access sensitive data, or cause device crashes. This could affect smartphones, tablets, IoT devices, and wireless communication equipment relying on these chipsets. Enterprises deploying mobile devices for sensitive communications or IoT infrastructure could face data breaches, operational disruptions, and loss of trust. The requirement for local access limits remote exploitation but does not eliminate risk, as attackers could leverage social engineering, malware, or insider threats to gain the necessary access. The broad range of affected products increases the attack surface, and the lack of current patches means many devices remain vulnerable. This vulnerability could also be exploited in targeted espionage or sabotage campaigns, especially in sectors where Qualcomm Snapdragon devices are prevalent.

Mitigation Recommendations

1. Monitor Qualcomm's official channels closely for patch releases and apply updates immediately upon availability to remediate the vulnerability. 2. Restrict local access to devices with affected Snapdragon platforms by enforcing strict physical security and limiting user privileges to trusted personnel only. 3. Implement endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of exploitation attempts, such as unusual memory access patterns or crashes related to camera processing. 4. Disable or restrict camera usage on devices where it is not essential, reducing the attack surface related to the vulnerable frame processing pipeline. 5. Conduct regular security audits and vulnerability assessments on devices incorporating affected Qualcomm components to identify and mitigate potential exploitation vectors. 6. Educate users about the risks of installing untrusted applications or granting unnecessary permissions that could facilitate local access exploitation. 7. For organizations deploying IoT or embedded devices with these chipsets, segment networks to limit lateral movement if a device is compromised. 8. Collaborate with device manufacturers and service providers to ensure timely firmware and software updates are delivered and installed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qualcomm
Date Reserved
2024-10-20T17:18:43.215Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a44485912abc71d6312e

Added to database: 2/26/2026, 7:51:32 PM

Last enriched: 2/26/2026, 9:16:29 PM

Last updated: 2/26/2026, 11:16:38 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses