Skip to main content

CVE-2024-53010: CWE-284 Improper Access Control in Qualcomm, Inc. Snapdragon

High
VulnerabilityCVE-2024-53010cvecve-2024-53010cwe-284
Published: Tue Jun 03 2025 (06/03/2025, 05:52:46 UTC)
Source: CVE Database V5
Vendor/Project: Qualcomm, Inc.
Product: Snapdragon

Description

Memory corruption may occur while attaching VM when the HLOS retains access to VM.

AI-Powered Analysis

AILast updated: 07/03/2025, 18:26:04 UTC

Technical Analysis

CVE-2024-53010 is a high-severity vulnerability identified in multiple Qualcomm Snapdragon platforms and associated wireless connectivity modules. The root cause is improper access control (CWE-284) that leads to memory corruption when attaching a virtual machine (VM) while the High-Level Operating System (HLOS) retains access to the VM. This suggests a flaw in the management of memory or resource access permissions between the HLOS and the VM environment, potentially allowing unauthorized or unintended access to memory regions. The vulnerability affects a broad range of Qualcomm products, including Snapdragon mobile platforms from various generations (e.g., Snapdragon 8 Gen 1, 8 Gen 2, 8 Gen 3, 7 series, 6 series, and compute platforms), FastConnect wireless subsystems, modem-RF systems, and other specialized platforms such as AR, robotics, and video collaboration platforms. The CVSS v3.1 base score is 7.8, indicating high severity, with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. This means the attack requires local access with low complexity and low privileges, no user interaction, and can lead to high impact on confidentiality, integrity, and availability. The vulnerability could be exploited to corrupt memory, potentially allowing privilege escalation, unauthorized data access, or denial of service. No public exploits are known at this time, and no patches have been linked yet. Given the extensive list of affected products, this vulnerability poses a significant risk to devices using Qualcomm Snapdragon chipsets, especially those running virtualized environments or relying on VM attachments in their architecture.

Potential Impact

For European organizations, the impact of CVE-2024-53010 is substantial due to the widespread use of Qualcomm Snapdragon chipsets in mobile devices, IoT devices, and embedded systems. Many enterprises and consumers in Europe rely on smartphones, tablets, and edge devices powered by these platforms. The vulnerability could allow attackers with local access (e.g., through compromised apps or insider threats) to escalate privileges, access sensitive data, or disrupt device functionality. This is particularly critical for sectors such as finance, healthcare, telecommunications, and critical infrastructure, where device integrity and confidentiality are paramount. Additionally, the vulnerability affects compute platforms and specialized hardware used in robotics and video collaboration, which are increasingly deployed in industrial automation and remote work environments across Europe. Exploitation could lead to data breaches, operational disruptions, or unauthorized control over devices, undermining trust and compliance with regulations like GDPR. The lack of known exploits currently provides a window for mitigation, but the broad attack surface and high impact necessitate urgent attention.

Mitigation Recommendations

1. Immediate assessment of affected devices within the organization to identify those using vulnerable Qualcomm Snapdragon platforms or associated subsystems. 2. Monitor Qualcomm and device manufacturers for official patches or firmware updates addressing CVE-2024-53010 and prioritize their deployment. 3. Restrict local access to devices by enforcing strong endpoint security controls, including application whitelisting, device encryption, and user privilege management to reduce the risk of local exploitation. 4. Implement runtime protection mechanisms such as memory protection, sandboxing, and integrity monitoring to detect and prevent memory corruption attempts. 5. For virtualized environments relying on these platforms, review VM attachment procedures and isolate critical workloads to minimize the impact of potential compromise. 6. Conduct security awareness training for users and administrators about the risks of local privilege escalation vulnerabilities and the importance of applying updates promptly. 7. Employ network segmentation and monitoring to detect anomalous behavior that could indicate exploitation attempts. 8. Collaborate with vendors and security communities to share threat intelligence and stay informed about emerging exploit techniques related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qualcomm
Date Reserved
2024-11-19T01:01:57.500Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683ee1eb182aa0cae2739613

Added to database: 6/3/2025, 11:52:11 AM

Last enriched: 7/3/2025, 6:26:04 PM

Last updated: 8/10/2025, 11:52:54 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats