Skip to main content

CVE-2024-49841: CWE-390 Detection of Error Condition Without Action in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2024-49841cvecve-2024-49841cwe-390
Published: Tue May 06 2025 (05/06/2025, 08:32:18 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption during memory assignment to headless peripheral VM due to incorrect error code handling.

AI-Powered Analysis

AILast updated: 07/05/2025, 10:40:28 UTC

Technical Analysis

CVE-2024-49841 is a high-severity vulnerability affecting a broad range of Qualcomm Snapdragon platforms and associated peripheral components. The vulnerability is classified under CWE-390, which refers to the detection of an error condition without appropriate action. Specifically, this flaw arises from incorrect error code handling during memory assignment operations to a headless peripheral virtual machine (VM). This improper handling leads to memory corruption, which can compromise the confidentiality, integrity, and availability of the affected system. The affected products span a wide array of Snapdragon mobile platforms, compute platforms, modem-RF systems, and peripheral chips, including but not limited to Snapdragon 8 Gen 1 and 8 Gen 3 Mobile Platforms, FastConnect series, and various QCA and QCM chipsets. The CVSS v3.1 base score is 7.8, indicating a high severity level, with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. This means the attack requires local access with low complexity and low privileges, no user interaction, and can result in high impact on confidentiality, integrity, and availability. The vulnerability does not currently have known exploits in the wild, but the extensive list of affected devices and platforms suggests a significant attack surface. The root cause is a failure to properly handle error codes during memory assignment, which allows memory corruption to occur, potentially enabling attackers to execute arbitrary code, escalate privileges, or cause denial of service. Given the wide deployment of Qualcomm Snapdragon components in mobile devices, IoT, automotive, and embedded systems, this vulnerability poses a substantial risk to a variety of environments.

Potential Impact

For European organizations, the impact of CVE-2024-49841 can be considerable due to the widespread use of Qualcomm Snapdragon chipsets in smartphones, tablets, automotive systems, and IoT devices. Confidentiality breaches could lead to leakage of sensitive corporate or personal data, while integrity compromises might allow attackers to manipulate device operations or firmware. Availability impacts could disrupt critical services, especially in sectors relying on embedded systems such as automotive, industrial automation, and telecommunications. The requirement for local access and low privilege means that attackers might exploit this vulnerability through compromised applications or insider threats. In automotive and industrial contexts, exploitation could lead to safety risks or operational downtime. Enterprises relying on mobile devices for secure communications and data access may face increased risk of targeted attacks or lateral movement within networks. The lack of current known exploits provides a window for proactive mitigation, but the high severity score underscores the urgency for patching and risk management. Additionally, the diversity of affected platforms means that supply chain and device management strategies must be comprehensive to address all vulnerable components.

Mitigation Recommendations

1. Immediate deployment of vendor-supplied patches and firmware updates once available is critical. Organizations should monitor Qualcomm and device manufacturers for security advisories and updates. 2. Implement strict device management policies to control local access to devices, limiting the potential for exploitation requiring local privileges. 3. Employ runtime protection mechanisms such as memory protection and integrity monitoring on devices where feasible to detect and prevent memory corruption exploitation. 4. Conduct thorough inventory and asset management to identify all devices using affected Snapdragon platforms, including embedded and IoT devices, to ensure comprehensive coverage. 5. For automotive and industrial systems, apply network segmentation and strict access controls to isolate vulnerable devices and reduce attack surface. 6. Enhance monitoring for anomalous behavior indicative of exploitation attempts, including unusual memory access patterns or crashes. 7. Educate users and administrators about the risks of local privilege escalation vulnerabilities and enforce least privilege principles. 8. Collaborate with suppliers and service providers to ensure timely updates and coordinated vulnerability response across the supply chain. These steps go beyond generic advice by emphasizing proactive device management, segmentation, and runtime protections tailored to the specific nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-10-20T17:18:43.216Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ac4522896dcbd8ff2

Added to database: 5/21/2025, 9:08:42 AM

Last enriched: 7/5/2025, 10:40:28 AM

Last updated: 8/13/2025, 4:10:08 AM

Views: 22

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats