Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-49844: CWE-20 Improper Input Validation in Qualcomm, Inc. Snapdragon

0
High
VulnerabilityCVE-2024-49844cvecve-2024-49844cwe-20
Published: Tue May 06 2025 (05/06/2025, 08:32:21 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption while triggering commands in the PlayReady Trusted application.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:26:36 UTC

Technical Analysis

CVE-2024-49844 is a vulnerability identified in Qualcomm's Snapdragon platforms stemming from improper input validation (CWE-20) within the PlayReady Trusted application. This flaw leads to memory corruption when certain commands are triggered, potentially allowing an attacker with limited privileges to execute arbitrary code or cause denial of service. The vulnerability affects an extensive list of Qualcomm products, including numerous Snapdragon mobile platforms (e.g., Snapdragon 8 Gen 1, 8 Gen 3, 865, 888 series), FastConnect wireless subsystems, automotive platforms, compute platforms, and various modem-RF systems. The root cause is inadequate validation of input data before processing, which can corrupt memory structures. The CVSS v3.1 score is 7.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no exploits are currently known in the wild, the vulnerability's presence in widely deployed chipsets used in smartphones, automotive systems, and IoT devices makes it a critical concern. The vulnerability could be leveraged by attackers to escalate privileges, execute arbitrary code, or disrupt device functionality. Qualcomm has not yet published patches, so mitigation currently relies on monitoring for updates and applying them promptly once available.

Potential Impact

The impact of CVE-2024-49844 is significant due to the broad deployment of affected Snapdragon platforms across consumer, automotive, and industrial devices worldwide. Successful exploitation can lead to full compromise of device confidentiality, integrity, and availability. Attackers could execute arbitrary code with elevated privileges, potentially gaining control over sensitive data, bypassing security controls, or causing device crashes and denial of service. This could affect smartphones, tablets, automotive infotainment and control systems, IoT devices, and other embedded systems relying on Qualcomm chipsets. The local attack vector means attackers need some level of access, such as a malicious app or local user access, but no user interaction is required, increasing the risk in multi-user or shared environments. The widespread use of Snapdragon platforms in critical infrastructure and consumer electronics amplifies the potential for large-scale impact, including privacy breaches, operational disruptions, and safety risks in automotive contexts.

Mitigation Recommendations

Organizations and device manufacturers should prioritize the following mitigations: 1) Monitor Qualcomm advisories and apply security patches immediately upon release to address the vulnerability. 2) Implement strict input validation and sanitization in the PlayReady Trusted application and related components to prevent memory corruption. 3) Employ sandboxing and privilege separation to limit the impact of potential exploitation, ensuring that compromised components cannot affect critical system functions. 4) Restrict local access to trusted users and applications, minimizing opportunities for attackers to trigger the vulnerability. 5) Conduct thorough security testing and fuzzing of firmware and trusted applications to identify and remediate similar input validation issues proactively. 6) For device manufacturers, consider firmware integrity verification and secure boot mechanisms to prevent unauthorized code execution. 7) Educate users about the risks of installing untrusted applications that could exploit local vulnerabilities. These measures, combined with timely patching, will reduce the risk and potential damage from exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-10-20T17:18:43.217Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9caf

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 2/26/2026, 8:26:36 PM

Last updated: 3/28/2026, 10:55:39 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses