CVE-2024-23354

8.4 HIGH

📋 TL;DR

This vulnerability allows memory corruption when an IOCTL call is interrupted by a signal in Qualcomm components, potentially leading to arbitrary code execution. It affects devices using Qualcomm chipsets, particularly Android smartphones and IoT devices. Attackers could exploit this to gain elevated privileges or crash systems.

💻 Affected Systems

Products:
  • Qualcomm chipsets and associated drivers
Versions: Specific versions detailed in Qualcomm May 2024 bulletin
Operating Systems: Android, Linux-based systems using Qualcomm drivers
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with Qualcomm components; exact models depend on chipset and driver versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with kernel-level code execution, allowing complete device control, data theft, and persistence.

🟠

Likely Case

Local privilege escalation from user to kernel mode, enabling further attacks or denial of service through system crashes.

🟢

If Mitigated

Limited impact with proper kernel hardening, SELinux policies, and exploit mitigations in place.

🌐 Internet-Facing: LOW - Requires local access or malware execution; not directly exploitable over network.
🏢 Internal Only: MEDIUM - Malicious apps or compromised users could exploit locally to escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to trigger IOCTL calls with signal interruption; kernel exploitation knowledge needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches included in Qualcomm May 2024 security bulletin updates

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2024-bulletin.html

Restart Required: Yes

Instructions:

1. Check device manufacturer for security updates. 2. Apply Qualcomm-provided patches through OEM firmware updates. 3. Reboot device after update.

🔧 Temporary Workarounds

Restrict IOCTL access

linux

Limit which processes can make IOCTL calls to vulnerable drivers using SELinux or similar MAC systems.

# Example SELinux policy to restrict ioctl access
# allow only trusted domains specific ioctls

🧯 If You Can't Patch

  • Implement strict application sandboxing to limit local exploit vectors.
  • Use kernel hardening features like SELinux enforcing mode and exploit mitigations (ASLR, stack protection).

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Qualcomm bulletin; use 'getprop ro.build.fingerprint' on Android to identify build.

Check Version:

adb shell getprop ro.build.fingerprint

Verify Fix Applied:

Verify security patch level includes May 2024 or later; check 'Settings > About phone > Android security patch level' on Android.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • Unexpected driver crashes
  • SELinux denials for ioctl operations

Network Indicators:

  • None - local exploitation only

SIEM Query:

source="kernel" AND ("panic" OR "Oops") AND "qualcomm"

🔗 References

📤 Share & Export