CVE-2024-21473

9.8 CRITICAL

📋 TL;DR

This vulnerability allows memory corruption when redirecting log files to arbitrary locations with arbitrary filenames in Qualcomm components. It affects devices using Qualcomm chipsets and software. Attackers could exploit this to execute arbitrary code or cause denial of service.

💻 Affected Systems

Products:
  • Qualcomm chipsets and associated software/firmware
Versions: Specific versions not detailed in provided references; check Qualcomm April 2024 bulletin for exact affected versions.
Operating Systems: Android, Linux-based systems using Qualcomm components
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where log redirection functionality is present in Qualcomm software components.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Application crash or denial of service affecting device functionality.

🟢

If Mitigated

Limited impact with proper input validation and memory protections in place.

🌐 Internet-Facing: HIGH - Memory corruption vulnerabilities can often be exploited remotely without authentication.
🏢 Internal Only: HIGH - Even internal systems are vulnerable if the flaw exists in core components.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

CVSS 9.8 suggests critical severity with high attack vector (network) and low attack complexity, but specific exploit details are not publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Qualcomm April 2024 security bulletin for specific patched versions.

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2024-bulletin.html

Restart Required: Yes

Instructions:

1. Check Qualcomm April 2024 security bulletin for affected components. 2. Apply firmware/software updates from device manufacturer. 3. Reboot device after update.

🔧 Temporary Workarounds

Restrict log redirection

all

Disable or restrict ability to redirect log files to arbitrary locations.

Configuration specific to system; consult vendor documentation.

Input validation enhancement

all

Implement strict validation on log file path and name parameters.

Requires code changes; not a simple command-line workaround.

🧯 If You Can't Patch

  • Isolate affected systems from untrusted networks.
  • Implement strict access controls and monitor for unusual log redirection attempts.

🔍 How to Verify

Check if Vulnerable:

Check device firmware/software version against Qualcomm April 2024 bulletin affected versions list.

Check Version:

Device-specific; typically 'cat /proc/version' or vendor-specific commands on Linux/Android systems.

Verify Fix Applied:

Verify installed firmware/software version matches or exceeds patched versions listed in Qualcomm bulletin.

📡 Detection & Monitoring

Log Indicators:

  • Unusual log file redirection attempts
  • Memory corruption errors in system logs

Network Indicators:

  • Unexpected network traffic to/from affected components

SIEM Query:

Search for memory corruption errors (segfaults, access violations) in system logs related to log handling processes.

🔗 References

📤 Share & Export