Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-49842: CWE-284 Improper Access Control in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2024-49842cvecve-2024-49842cwe-284
Published: Tue May 06 2025 (05/06/2025, 08:32:19 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption during memory mapping into protected VM address space due to incorrect API restrictions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:26:19 UTC

Technical Analysis

CVE-2024-49842 is a vulnerability classified under CWE-284 (Improper Access Control) affecting a wide array of Qualcomm Snapdragon platforms. The root cause is an improper restriction in the API responsible for memory mapping operations into protected virtual memory (VM) address spaces. This improper access control leads to memory corruption, which can be exploited by a low-privileged local attacker to escalate privileges or execute arbitrary code within the system. The vulnerability spans numerous Snapdragon chipsets and platforms, including mobile processors (e.g., Snapdragon 8 Gen 1, 888, 765 series), compute platforms (e.g., Snapdragon 8cx series), automotive platforms, and wireless connectivity modules (FastConnect series). The CVSS v3.1 score is 7.8, reflecting a high severity due to the combination of local attack vector with low complexity, no user interaction required, and high impact on confidentiality, integrity, and availability. The flaw allows attackers to bypass memory protection mechanisms, potentially compromising sensitive data or disrupting device operations. Qualcomm has published the vulnerability but no patches or known exploits are currently available. The vulnerability's extensive impact surface includes smartphones, tablets, laptops, automotive systems, and IoT devices utilizing affected Snapdragon components, making it a critical concern for device manufacturers and end-users alike.

Potential Impact

The impact of CVE-2024-49842 is significant for organizations and individuals using devices powered by affected Qualcomm Snapdragon platforms. Successful exploitation can lead to unauthorized access to protected memory regions, resulting in privilege escalation, arbitrary code execution, or denial of service. This compromises the confidentiality, integrity, and availability of the affected devices. For enterprises, this could mean exposure of sensitive corporate data on mobile or edge devices, disruption of critical communications, or compromise of embedded systems in automotive or industrial environments. The broad range of affected platforms increases the attack surface, potentially affecting millions of consumer devices and enterprise hardware globally. The local attack vector implies that attackers need some form of access to the device, such as through malicious apps or insider threats, but no user interaction is required, increasing the risk of stealthy exploitation. The absence of known exploits in the wild currently limits immediate risk, but the high severity score and widespread device usage necessitate urgent attention to mitigation and patching strategies.

Mitigation Recommendations

To mitigate CVE-2024-49842, organizations and device manufacturers should: 1) Monitor Qualcomm and device vendor advisories closely for official patches and apply them promptly once available. 2) Implement strict application whitelisting and privilege management on devices to limit the ability of untrusted or low-privileged code to invoke vulnerable APIs. 3) Employ runtime protection mechanisms such as memory protection units (MPUs) and secure boot to reduce the risk of unauthorized memory access. 4) Conduct thorough security audits and testing of custom firmware or software layers interacting with Snapdragon components to detect improper API usage. 5) Limit physical and local access to devices, especially in enterprise or critical infrastructure environments, to reduce the risk of local exploitation. 6) Use mobile device management (MDM) solutions to enforce security policies and monitor for anomalous behavior indicative of exploitation attempts. 7) Educate users and administrators about the risks of installing untrusted applications or granting excessive permissions that could facilitate local attacks. These steps go beyond generic patching advice by emphasizing layered defense, access control hardening, and proactive monitoring tailored to the vulnerability's characteristics.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-10-20T17:18:43.217Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9cab

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 2/26/2026, 8:26:19 PM

Last updated: 3/26/2026, 11:09:00 AM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses