Skip to main content

CVE-2024-49847: CWE-126 Buffer Over-read in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2024-49847cvecve-2024-49847cwe-126
Published: Tue May 06 2025 (05/06/2025, 08:32:24 UTC)
Source: CVE
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Transient DOS while processing of a registration acceptance OTA due to incorrect ciphering key data IE.

AI-Powered Analysis

AILast updated: 07/05/2025, 17:43:25 UTC

Technical Analysis

CVE-2024-49847 is a high-severity buffer over-read vulnerability (CWE-126) affecting a broad range of Qualcomm Snapdragon components, including mobile platforms, modem-RF systems, and wireless connectivity modules. The flaw arises during the processing of a registration acceptance over-the-air (OTA) message when incorrect ciphering key data information elements (IE) are handled. Specifically, the vulnerability causes a transient denial-of-service (DoS) condition by reading beyond the allocated buffer boundaries, which can disrupt normal device operation temporarily. The vulnerability does not impact confidentiality or integrity but directly affects availability by causing system instability or crashes. Exploitation requires no privileges or user interaction and can be triggered remotely over the network, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The affected product list is extensive, covering multiple Snapdragon mobile platforms (e.g., Snapdragon 8 Gen 3, Snapdragon 429), modem-RF systems (e.g., Snapdragon Auto 5G Modem-RF Gen 2), and wireless connectivity chips (e.g., WCN series, WSA series). No known exploits are currently reported in the wild, and Qualcomm has not yet published patches. The vulnerability was publicly disclosed in May 2025, with a CVSS score of 7.5, reflecting its high impact on availability and ease of exploitation. Given the widespread deployment of Snapdragon components in smartphones, automotive systems, and IoT devices, this vulnerability poses a significant risk to device stability and service continuity.

Potential Impact

For European organizations, the impact of CVE-2024-49847 can be substantial, especially for those relying on Snapdragon-based devices for critical communications, mobile workforce operations, or connected automotive systems. The transient DoS condition can lead to unexpected device reboots or loss of network connectivity, disrupting business operations, communications, and safety-critical functions in automotive or industrial IoT environments. Telecommunications providers and enterprises using Snapdragon-powered mobile devices may experience service interruptions, affecting productivity and customer service. Additionally, sectors such as automotive manufacturing and smart infrastructure, which increasingly integrate Snapdragon modem and connectivity modules, could face operational risks and potential safety concerns due to device instability. While the vulnerability does not allow data exfiltration or privilege escalation, the availability impact alone can cause significant operational downtime and user inconvenience.

Mitigation Recommendations

Given the absence of published patches at this time, European organizations should implement several targeted mitigations: 1) Inventory and identify all devices and systems using affected Qualcomm Snapdragon components to assess exposure. 2) Where possible, restrict network access to vulnerable devices by implementing network segmentation and firewall rules to limit OTA message sources to trusted entities only. 3) Monitor device logs and network traffic for abnormal reboots or connectivity disruptions that may indicate exploitation attempts. 4) Coordinate with device manufacturers and vendors to obtain firmware updates or patches as soon as they become available and prioritize their deployment. 5) For automotive and industrial IoT deployments, implement redundant communication paths and failover mechanisms to mitigate transient DoS impacts. 6) Educate IT and security teams about the vulnerability specifics to enhance incident response readiness. 7) Consider temporary disabling or limiting OTA registration acceptance features if configurable and feasible without impacting critical operations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-10-20T17:18:43.218Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981cc4522896dcbda337

Added to database: 5/21/2025, 9:08:44 AM

Last enriched: 7/5/2025, 5:43:25 PM

Last updated: 8/2/2025, 6:13:51 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats