CVE-2024-21464

8.4 HIGH

📋 TL;DR

This CVE describes a memory corruption vulnerability in Qualcomm's IPA (IP Accelerator) statistics processing when no active clients are registered. Successful exploitation could allow attackers to execute arbitrary code or cause denial of service on affected devices. This primarily affects devices using Qualcomm chipsets with vulnerable IPA implementations.

💻 Affected Systems

Products:
  • Qualcomm chipsets with IPA functionality
Versions: Specific versions not detailed in reference; check Qualcomm advisory for exact affected versions
Operating Systems: Android, Linux-based systems using Qualcomm chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers only when no active clients are registered to IPA statistics, which may be an uncommon but possible state.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with kernel privileges leading to complete device compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Device crash/reboot causing denial of service, potentially requiring physical reset or factory restore.

🟢

If Mitigated

Limited impact with proper network segmentation and exploit mitigations, possibly resulting in service disruption without data compromise.

🌐 Internet-Facing: MEDIUM - Requires specific network access to IPA services, but could be exploited remotely if services are exposed.
🏢 Internal Only: MEDIUM - Internal attackers with network access to affected services could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of IPA statistics handling and memory corruption techniques. No public exploits known as of advisory publication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Qualcomm January 2025 security bulletin for specific patched versions

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html

Restart Required: Yes

Instructions:

1. Check device manufacturer for firmware updates. 2. Apply Qualcomm-provided patches through OEM updates. 3. Reboot device after update installation. 4. Verify patch application through version checks.

🔧 Temporary Workarounds

Disable IPA statistics if unused

all

If IPA statistics functionality is not required, disable it to prevent the vulnerable code path from being triggered.

Specific commands depend on device configuration and OEM implementation

🧯 If You Can't Patch

  • Network segmentation to restrict access to IPA services
  • Implement exploit mitigations like ASLR and stack canaries if supported by platform

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Qualcomm's advisory and OEM security bulletins

Check Version:

Device-specific commands vary by manufacturer (e.g., 'getprop ro.build.version.security_patch' on Android)

Verify Fix Applied:

Verify firmware version has been updated to patched version specified by OEM

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • IPA service crashes
  • Memory corruption error messages in system logs

Network Indicators:

  • Unusual network traffic to IPA service ports
  • Multiple connection attempts to IPA statistics endpoints

SIEM Query:

Search for kernel panic events or service crashes related to IPA or Qualcomm drivers within specific time windows

🔗 References

📤 Share & Export