CVE-2023-24844

8.4 HIGH

📋 TL;DR

This vulnerability allows memory corruption in Qualcomm's Core component when invoking calls to the Access Control core library with hardware-protected address ranges. It affects devices using Qualcomm chipsets, potentially enabling attackers to execute arbitrary code or cause denial of service. The impact is limited to systems with specific hardware configurations that expose this interface.

💻 Affected Systems

Products:
  • Qualcomm chipsets with specific Core components
Versions: Multiple Qualcomm chipset versions prior to October 2023 patches
Operating Systems: Android, Linux-based systems using Qualcomm chips
Default Config Vulnerable: ⚠️ Yes
Notes: Requires specific hardware configurations and access to protected memory ranges. Not all Qualcomm devices are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or persistent backdoor installation on affected devices.

🟠

Likely Case

Local privilege escalation allowing attackers to gain elevated permissions on already-compromised devices or denial of service crashes.

🟢

If Mitigated

Limited impact due to hardware protection layers preventing exploitation or successful containment by security controls.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires specific hardware access and understanding of protected memory ranges. No public exploits available as of knowledge cutoff.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Qualcomm security bulletin October 2023 patches

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin

Restart Required: Yes

Instructions:

1. Check device manufacturer for firmware updates. 2. Apply Qualcomm-provided patches through OEM updates. 3. Reboot device after patch installation. 4. Verify patch application through version checks.

🔧 Temporary Workarounds

Restrict hardware access

all

Limit access to hardware-protected memory interfaces through system configuration

Device-specific configuration commands vary by manufacturer

🧯 If You Can't Patch

  • Isolate affected devices from critical networks
  • Implement strict access controls to prevent unauthorized hardware interface access

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Qualcomm security bulletin. Review system logs for memory access errors in protected ranges.

Check Version:

Device-specific commands vary by manufacturer (e.g., Android: getprop ro.build.fingerprint)

Verify Fix Applied:

Verify firmware version has been updated to post-October 2023 patches. Confirm no memory corruption events in system logs.

📡 Detection & Monitoring

Log Indicators:

  • Memory access violations in protected address ranges
  • Core component crashes
  • Access Control library errors

Network Indicators:

  • Unusual hardware interface access patterns

SIEM Query:

Device logs: (event_category="memory_error" OR component="Core") AND address_range="protected"

🔗 References

📤 Share & Export