Skip to main content

CVE-2024-49842: CWE-284 Improper Access Control in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2024-49842cvecve-2024-49842cwe-284
Published: Tue May 06 2025 (05/06/2025, 08:32:19 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption during memory mapping into protected VM address space due to incorrect API restrictions.

AI-Powered Analysis

AILast updated: 07/05/2025, 15:41:49 UTC

Technical Analysis

CVE-2024-49842 is a high-severity vulnerability affecting a broad range of Qualcomm Snapdragon platforms and associated components. The root cause is improper access control (CWE-284) leading to memory corruption during the mapping of memory into protected virtual memory (VM) address space. This occurs due to incorrect API restrictions that fail to adequately validate or restrict memory mapping operations. The vulnerability impacts numerous Snapdragon SoCs, modems, connectivity chips, and compute platforms spanning mobile, automotive, wearable, and XR devices. The CVSS 3.1 score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) indicates that the exploit requires local access with low complexity and low privileges but no user interaction. Successful exploitation can result in full compromise of confidentiality, integrity, and availability of the affected system. Given the extensive list of affected products, this vulnerability potentially impacts a wide ecosystem of devices using Qualcomm Snapdragon components, including smartphones, tablets, automotive infotainment systems, XR devices, and IoT endpoints. The vulnerability allows attackers with limited privileges to escalate access and execute arbitrary code or cause denial of service by corrupting memory in protected VM regions. Although no known exploits are currently reported in the wild, the broad impact and high severity necessitate urgent patching once fixes are available. Qualcomm has not yet published patch links, indicating remediation is forthcoming. Organizations relying on Snapdragon-based devices should prepare for rapid deployment of security updates and monitor for exploit attempts. This vulnerability highlights the criticality of strict API access controls in memory management within complex SoCs and the risks posed by improper validation in privileged operations.

Potential Impact

For European organizations, the impact of CVE-2024-49842 is significant due to the widespread use of Qualcomm Snapdragon platforms in consumer and enterprise devices. Smartphones and tablets used by employees, automotive systems in connected vehicles, and IoT devices in industrial and smart city deployments are all potentially vulnerable. Exploitation could lead to unauthorized access to sensitive corporate data, disruption of critical communications, or compromise of automotive safety systems. The high confidentiality, integrity, and availability impact means attackers could steal data, implant persistent malware, or cause device failures. This is particularly concerning for sectors such as finance, healthcare, automotive manufacturing, and critical infrastructure where Snapdragon-powered devices are common. The local access requirement implies attackers need some foothold on the device, but this could be achieved via other malware or insider threats. The lack of user interaction requirement increases risk of stealthy exploitation. The vulnerability could also be leveraged in targeted attacks against high-value European targets or supply chain compromise. Overall, this vulnerability poses a substantial risk to operational continuity, data protection compliance (e.g., GDPR), and safety-critical applications in Europe.

Mitigation Recommendations

1. Immediate inventory and identification of all devices using affected Qualcomm Snapdragon platforms within the organization, including mobile, automotive, IoT, and XR devices. 2. Monitor Qualcomm security advisories and vendor-specific patches closely; prioritize rapid deployment of official security updates once released. 3. Until patches are available, restrict local access to devices by enforcing strong endpoint security controls, such as device encryption, multi-factor authentication, and limiting physical access. 4. Employ runtime protection and behavior monitoring on endpoints to detect anomalous memory mapping or privilege escalation attempts indicative of exploitation. 5. For automotive and embedded systems, coordinate with OEMs and suppliers to ensure firmware updates are applied promptly. 6. Implement network segmentation to isolate vulnerable devices and limit lateral movement in case of compromise. 7. Educate users and administrators about the risks of local privilege escalation vulnerabilities and the importance of applying updates. 8. Consider deploying endpoint detection and response (EDR) solutions capable of identifying exploitation techniques targeting memory corruption and access control flaws. 9. Review and harden API usage policies and access controls in custom applications interfacing with Qualcomm components to reduce attack surface. 10. Engage with Qualcomm and device manufacturers for detailed technical guidance and support during remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-10-20T17:18:43.217Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9cab

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 3:41:49 PM

Last updated: 8/12/2025, 10:44:07 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats