CVE-2024-23373
📋 TL;DR
This vulnerability allows memory corruption when IOMMU unmap operations fail, leading to improper release of DMA and anonymous buffers. It affects systems using Qualcomm chipsets with vulnerable IOMMU implementations. Attackers could potentially exploit this to execute arbitrary code or cause denial of service.
💻 Affected Systems
- Qualcomm chipsets with IOMMU support
📦 What is this software?
Flight Rb5 5g Platform Firmware by Qualcomm
Smart Audio 400 Platform Firmware by Qualcomm
Snapdragon 210 Processor Firmware by Qualcomm
Snapdragon 212 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 212 Mobile Platform Firmware →
Snapdragon 4 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Platform Firmware →
Snapdragon 4 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 2 Mobile Platform Firmware →
Snapdragon 439 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 439 Mobile Platform Firmware →
Snapdragon 460 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 460 Mobile Platform Firmware →
Snapdragon 480 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 480 5g Mobile Platform Firmware →
Snapdragon 660 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 660 Mobile Platform Firmware →
Snapdragon 662 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 662 Mobile Platform Firmware →
Snapdragon 670 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 670 Mobile Platform Firmware →
Snapdragon 675 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 675 Mobile Platform Firmware →
Snapdragon 680 4g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 680 4g Mobile Platform Firmware →
Snapdragon 690 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 690 5g Mobile Platform Firmware →
Snapdragon 695 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 695 5g Mobile Platform Firmware →
Snapdragon 710 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 710 Mobile Platform Firmware →
Snapdragon 720g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 720g Mobile Platform Firmware →
Snapdragon 750g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 750g 5g Mobile Platform Firmware →
Snapdragon 778g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Platform Firmware →
Snapdragon 780g 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 780g 5g Mobile Platform Firmware →
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 3 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Platform Firmware →
Snapdragon 820 Automotive Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 820 Automotive Platform Firmware →
Snapdragon 835 Mobile Pc Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 835 Mobile Pc Platform Firmware →
Snapdragon 845 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 845 Mobile Platform Firmware →
Snapdragon 855 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 855 Mobile Platform Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 888 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 888 5g Mobile Platform Firmware →
Snapdragon Ar2 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar2 Gen 1 Platform Firmware →
Snapdragon Auto 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Firmware →
Snapdragon W5\+ Gen 1 Wearable Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon W5\+ Gen 1 Wearable Platform Firmware →
Snapdragon Wear 4100\+ Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Wear 4100\+ Platform Firmware →
Snapdragon X12 Lte Modem Firmware by Qualcomm
Snapdragon X50 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X50 5g Modem Rf System Firmware →
Snapdragon X55 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf System Firmware →
Snapdragon X62 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X62 5g Modem Rf System Firmware →
Snapdragon X65 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf System Firmware →
Snapdragon Xr1 Platform Firmware by Qualcomm
Snapdragon Xr2 5g Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Xr2 5g Platform Firmware →
Snapdragon Xr2\+ Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Xr2\+ Gen 1 Platform Firmware →
Video Collaboration Vc1 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc1 Platform Firmware →
Video Collaboration Vc3 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc3 Platform Firmware →
Video Collaboration Vc5 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc5 Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with kernel-level code execution, allowing attackers to bypass security boundaries and gain persistent access to the device.
Likely Case
System instability, crashes, or denial of service conditions affecting device availability and performance.
If Mitigated
Limited impact with proper memory isolation and access controls preventing escalation beyond the affected process.
🎯 Exploit Status
Exploitation requires local access and knowledge of memory management internals. No public exploit code is available at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm's July 2024 security bulletin for specific patched versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html
Restart Required: Yes
Instructions:
1. Check Qualcomm advisory for affected chipset models. 2. Obtain firmware/software updates from device manufacturer. 3. Apply updates following manufacturer instructions. 4. Reboot device to activate fixes.
🔧 Temporary Workarounds
Disable IOMMU (not recommended)
linuxDisabling IOMMU eliminates the vulnerability but reduces security and performance for DMA operations
echo 0 > /sys/kernel/iommu_groups/*/devices/*/iommu_group
🧯 If You Can't Patch
- Restrict physical access to devices to prevent local exploitation
- Implement strict application sandboxing to limit potential impact of memory corruption
🔍 How to Verify
Check if Vulnerable:
Check chipset version and compare against Qualcomm's advisory. Use: cat /proc/cpuinfo | grep -i qualcomm
Check Version:
cat /proc/version && dmesg | grep -i qualcomm
Verify Fix Applied:
Verify firmware/software version matches patched versions listed in Qualcomm bulletin
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs related to IOMMU
- DMA operation failures in system logs
- Memory corruption errors in dmesg
Network Indicators:
- None - this is a local memory corruption vulnerability
SIEM Query:
source="kernel" AND ("IOMMU" OR "DMA") AND ("panic" OR "corruption" OR "failure")