CVE-2024-21469

7.3 HIGH

📋 TL;DR

This vulnerability involves memory corruption when an invoke call and a TEE (Trusted Execution Environment) call target the same trusted application simultaneously. It affects devices with Qualcomm chipsets that utilize TEE functionality, potentially allowing attackers to execute arbitrary code or cause denial of service.

💻 Affected Systems

Products:
  • Qualcomm chipsets with TEE support
Versions: Specific versions not detailed in provided references; refer to Qualcomm July 2024 bulletin for exact affected chipsets.
Operating Systems: Android, Linux-based systems using Qualcomm chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires TEE functionality to be enabled and used; devices without TEE usage may not be affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with kernel privileges, leading to complete device compromise, data theft, or persistent malware installation.

🟠

Likely Case

Local privilege escalation allowing attackers to gain elevated permissions, access sensitive data, or disrupt trusted application functionality.

🟢

If Mitigated

Limited impact with proper isolation controls, potentially causing only application crashes or denial of service to specific trusted applications.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires local access and knowledge of TEE operations; no public exploits known as of July 2024.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm July 2024 security bulletin for specific chipset firmware updates.

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html

Restart Required: Yes

Instructions:

1. Check Qualcomm bulletin for affected chipset list. 2. Contact device manufacturer for firmware updates. 3. Apply firmware patches provided by manufacturer. 4. Reboot device after update.

🔧 Temporary Workarounds

Disable TEE functionality

all

Disables Trusted Execution Environment features to prevent exploitation, but may break security-dependent applications.

Not applicable - requires firmware/OS configuration changes

Restrict TEE access

all

Limit which applications can make TEE calls through security policies.

Not applicable - requires security policy configuration

🧯 If You Can't Patch

  • Isolate affected devices from untrusted networks and users.
  • Implement strict access controls and monitoring for TEE-related operations.

🔍 How to Verify

Check if Vulnerable:

Check device chipset model and firmware version against Qualcomm's July 2024 security bulletin.

Check Version:

Android: 'getprop ro.bootloader' or 'getprop ro.build.fingerprint'; Linux: Check /proc/cpuinfo for chipset info

Verify Fix Applied:

Verify firmware version has been updated to a version listed as patched in Qualcomm bulletin.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected TEE invocation failures
  • Memory corruption errors in kernel logs
  • Trusted application crashes

Network Indicators:

  • Not typically network-exploitable; focus on local system indicators

SIEM Query:

source="kernel" AND ("TEE" OR "trustzone") AND ("corruption" OR "panic" OR "oops")

🔗 References

📤 Share & Export