CVE-2024-21462

7.1 HIGH

📋 TL;DR

This vulnerability allows a denial-of-service attack when loading Trusted Application (TA) ELF files on Qualcomm chipsets. It affects devices using Qualcomm processors with vulnerable firmware. Attackers can cause temporary system instability or crashes.

💻 Affected Systems

Products:
  • Qualcomm chipsets with Trusted Execution Environment (TEE) functionality
Versions: Specific firmware versions listed in Qualcomm July 2024 security bulletin
Operating Systems: Android and other OS using Qualcomm TEE
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with Qualcomm processors that support Trusted Applications

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

System crash requiring reboot, potentially disrupting device functionality and availability

🟠

Likely Case

Temporary denial-of-service affecting specific applications or services using TA functionality

🟢

If Mitigated

Minimal impact with proper firmware updates and security controls

🌐 Internet-Facing: MEDIUM - Requires local access or malicious app installation, but could be combined with other exploits
🏢 Internal Only: MEDIUM - Local attackers or malicious apps could trigger the vulnerability

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to load malicious TA ELF files, typically needs elevated privileges or app vulnerabilities

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware updates specified in Qualcomm July 2024 security bulletin

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html

Restart Required: Yes

Instructions:

1. Check Qualcomm advisory for specific affected chipsets. 2. Contact device manufacturer for firmware updates. 3. Apply firmware updates through official channels. 4. Reboot device after update.

🔧 Temporary Workarounds

Restrict TA loading

all

Limit which applications can load Trusted Applications

Application sandboxing

all

Implement strict application isolation to prevent malicious TA loading

🧯 If You Can't Patch

  • Implement strict application vetting and security policies
  • Monitor for abnormal system behavior or crashes related to TA operations

🔍 How to Verify

Check if Vulnerable:

Check firmware version against Qualcomm security bulletin and device manufacturer advisories

Check Version:

Device-specific commands vary by manufacturer (e.g., Settings > About Phone on Android)

Verify Fix Applied:

Verify firmware version has been updated to patched version from manufacturer

📡 Detection & Monitoring

Log Indicators:

  • System crashes during TA loading
  • Kernel panic logs
  • TEE-related error messages

Network Indicators:

  • None - local vulnerability

SIEM Query:

Search for: 'TA loading failed', 'TEE crash', 'kernel panic' in system logs

🔗 References

📤 Share & Export