CVE-2024-21455

7.8 HIGH

📋 TL;DR

This vulnerability allows memory corruption when a compat IOCTL call is followed by another IOCTL call from userspace to a Qualcomm driver. Attackers could potentially execute arbitrary code or cause denial of service. Affects devices with Qualcomm chipsets including smartphones, IoT devices, and embedded systems.

💻 Affected Systems

Products:
  • Qualcomm chipsets and associated drivers
Versions: Specific versions not detailed in reference; check Qualcomm October 2024 bulletin for exact affected versions
Operating Systems: Android, Linux-based systems using Qualcomm drivers
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with Qualcomm hardware where the vulnerable driver is loaded and accessible. Mobile devices and embedded systems are primary targets.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with kernel privileges leading to complete system compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation allowing attackers to gain elevated privileges on the device, potentially leading to data access or further system compromise.

🟢

If Mitigated

Denial of service through system crash or instability if exploitation attempts fail or are partially successful.

🌐 Internet-Facing: MEDIUM - Requires local access but could be combined with other vulnerabilities for remote exploitation.
🏢 Internal Only: HIGH - Local attackers or malicious apps could exploit this for privilege escalation on affected devices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to make IOCTL calls. Memory corruption vulnerabilities often lead to reliable exploitation once understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Qualcomm October 2024 security bulletin for specific patched versions

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html

Restart Required: Yes

Instructions:

1. Check Qualcomm advisory for affected chipset/driver versions. 2. Obtain updated firmware/drivers from device manufacturer. 3. Apply patches following device-specific update procedures. 4. Reboot device to load patched drivers.

🔧 Temporary Workarounds

Restrict IOCTL access

linux

Limit access to vulnerable driver IOCTL interfaces using SELinux or similar MAC systems

# Example SELinux policy to restrict access
# require device-specific policy configuration

Disable vulnerable driver

linux

Prevent loading of the vulnerable driver if not required for system operation

# Blacklist driver module
echo "blacklist vulnerable_driver" >> /etc/modprobe.d/blacklist.conf

🧯 If You Can't Patch

  • Implement strict application sandboxing to limit IOCTL access from untrusted applications
  • Deploy endpoint protection that monitors for suspicious IOCTL patterns and memory corruption attempts

🔍 How to Verify

Check if Vulnerable:

Check Qualcomm chipset version and driver versions against advisory. Use 'lsmod' or similar to check if vulnerable driver is loaded.

Check Version:

# Check kernel modules: lsmod | grep -i qualcomm
# Check chipset info varies by device

Verify Fix Applied:

Verify driver version matches patched version from Qualcomm advisory. Check that security updates have been applied through device update mechanism.

📡 Detection & Monitoring

Log Indicators:

  • Multiple IOCTL calls to same driver in short succession
  • Kernel panic or crash logs
  • SELinux denials for driver access

Network Indicators:

  • Local exploitation only; no direct network indicators

SIEM Query:

Process making multiple ioctl() system calls to driver devices in rapid succession

🔗 References

📤 Share & Export