Skip to main content

CVE-2024-49845: CWE-20 Improper Input Validation in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2024-49845cvecve-2024-49845cwe-20
Published: Tue May 06 2025 (05/06/2025, 08:32:22 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption during the FRS UDS generation process.

AI-Powered Analysis

AILast updated: 07/05/2025, 15:42:20 UTC

Technical Analysis

CVE-2024-49845 is a high-severity vulnerability identified in a wide range of Qualcomm Snapdragon products and associated components. The vulnerability stems from improper input validation (CWE-20) during the FRS UDS (Firmware Resource System Unified Diagnostic Services) generation process, which leads to memory corruption. Memory corruption vulnerabilities can allow attackers to manipulate memory in unintended ways, potentially enabling arbitrary code execution, privilege escalation, or denial of service. The affected products include numerous Snapdragon mobile platforms (e.g., Snapdragon 8 Gen 1, 8 Gen 3, 865, 888 series), FastConnect wireless subsystems, modem-RF systems, compute platforms, and various wireless connectivity chips (WCD, WCN, WSA series). The CVSS v3.1 base score is 7.8, indicating a high severity level. The vector string (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) shows that the attack requires local access with low complexity, low privileges, and no user interaction, but can impact confidentiality, integrity, and availability substantially. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability's root cause is the failure to properly validate inputs during the FRS UDS generation, which is a critical process in firmware diagnostics and resource management. Exploitation could allow an attacker with local access to cause memory corruption, potentially leading to execution of arbitrary code or system crashes, severely impacting device security and stability.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially those relying on devices powered by Qualcomm Snapdragon platforms, including smartphones, tablets, IoT devices, automotive systems, and enterprise mobile computing platforms. The broad range of affected Snapdragon variants means that many mobile devices used by employees, as well as embedded systems in industrial or automotive contexts, could be vulnerable. Exploitation could lead to unauthorized data access, disruption of critical communications, or compromise of device integrity, impacting confidentiality, availability, and operational continuity. Given the local attack vector, insider threats or malware already present on devices could leverage this vulnerability to escalate privileges or persist undetected. In sectors such as finance, healthcare, and critical infrastructure, where mobile and embedded device security is paramount, the vulnerability could facilitate lateral movement or data exfiltration. The lack of user interaction requirement increases the risk of automated exploitation once local access is obtained. The absence of known exploits currently provides a window for mitigation, but the high severity score necessitates prompt attention to prevent future exploitation.

Mitigation Recommendations

Organizations should implement a multi-layered mitigation approach: 1) Inventory and identify all devices and embedded systems using affected Qualcomm Snapdragon platforms and components. 2) Monitor vendor communications closely for official patches or firmware updates addressing CVE-2024-49845 and apply them promptly once available. 3) Restrict local access to devices, enforcing strict physical security controls and limiting administrative privileges to reduce the risk of local exploitation. 4) Employ endpoint detection and response (EDR) solutions capable of detecting anomalous behavior indicative of memory corruption or privilege escalation attempts on affected devices. 5) Harden device configurations by disabling unnecessary diagnostic or firmware resource services that utilize the FRS UDS generation process, if feasible. 6) Educate users and administrators about the risks of local access exploitation and enforce strong authentication and device encryption to protect data confidentiality. 7) For embedded and IoT deployments, consider network segmentation and strict access controls to isolate vulnerable devices from critical systems. 8) Conduct regular security assessments and penetration testing focusing on local privilege escalation vectors to identify potential exploitation paths related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-10-20T17:18:43.217Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9cd5

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 3:42:20 PM

Last updated: 7/29/2025, 11:44:49 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats