CVE-2024-21474

8.4 HIGH

📋 TL;DR

This CVE describes a memory corruption vulnerability in Qualcomm components where a buffer size from a previous function call is reused without proper validation or reinitialization. Attackers could exploit this to execute arbitrary code or cause denial of service. The vulnerability affects devices using Qualcomm chipsets, particularly mobile devices and IoT products.

💻 Affected Systems

Products:
  • Qualcomm chipsets and associated firmware
Versions: Multiple Qualcomm chipset versions (specific versions detailed in Qualcomm advisory)
Operating Systems: Android, Linux-based IoT operating systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices using vulnerable Qualcomm components regardless of OS version. The vulnerability is in Qualcomm's proprietary code.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with kernel privileges leading to complete device compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation allowing attackers to gain elevated permissions on already-compromised devices or denial of service crashes.

🟢

If Mitigated

Controlled crashes or failed exploitation attempts with proper memory protections and exploit mitigations in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access or ability to execute code on the device. Memory corruption vulnerabilities in Qualcomm components have been weaponized in the past.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm's May 2024 security bulletin for specific patched versions

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2024-bulletin.html

Restart Required: Yes

Instructions:

1. Check Qualcomm advisory for affected chipset versions. 2. Obtain firmware updates from device manufacturer. 3. Apply manufacturer-provided security patches. 4. Reboot device to activate fixes.

🔧 Temporary Workarounds

Restrict local code execution

all

Limit ability for untrusted users or applications to execute code on affected devices

Enable exploit mitigations

all

Activate ASLR, DEP, and other memory protection features where available

🧯 If You Can't Patch

  • Isolate affected devices from untrusted networks and users
  • Implement strict application allowlisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Qualcomm's advisory. Use manufacturer-specific commands to check chipset firmware versions.

Check Version:

Manufacturer-specific (e.g., 'getprop ro.build.fingerprint' on Android for some devices)

Verify Fix Applied:

Verify firmware version has been updated to patched version specified in Qualcomm advisory. Check with device manufacturer for specific verification steps.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • Memory corruption error messages in system logs
  • Unexpected process crashes in privileged contexts

Network Indicators:

  • Unusual outbound connections from system processes
  • Anomalous network traffic from device management interfaces

SIEM Query:

Process: (crash OR panic OR segmentation) AND (kernel OR privileged) AND DeviceVendor:Qualcomm

🔗 References

📤 Share & Export