CVE-2024-23373

8.4 HIGH

📋 TL;DR

This vulnerability allows memory corruption when IOMMU unmap operations fail, leading to improper release of DMA and anonymous buffers. It affects systems using Qualcomm chipsets with vulnerable IOMMU implementations. Attackers could potentially exploit this to execute arbitrary code or cause denial of service.

💻 Affected Systems

Products:
  • Qualcomm chipsets with IOMMU support
Versions: Specific versions not publicly detailed in references; consult Qualcomm advisory for exact affected versions
Operating Systems: Android, Linux-based systems using Qualcomm chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where IOMMU is enabled and used for DMA operations. The vulnerability is hardware/firmware level in Qualcomm components.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with kernel-level code execution, allowing attackers to bypass security boundaries and gain persistent access to the device.

🟠

Likely Case

System instability, crashes, or denial of service conditions affecting device availability and performance.

🟢

If Mitigated

Limited impact with proper memory isolation and access controls preventing escalation beyond the affected process.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires local access and knowledge of memory management internals. No public exploit code is available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm's July 2024 security bulletin for specific patched versions

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html

Restart Required: Yes

Instructions:

1. Check Qualcomm advisory for affected chipset models. 2. Obtain firmware/software updates from device manufacturer. 3. Apply updates following manufacturer instructions. 4. Reboot device to activate fixes.

🔧 Temporary Workarounds

Disable IOMMU (not recommended)

linux

Disabling IOMMU eliminates the vulnerability but reduces security and performance for DMA operations

echo 0 > /sys/kernel/iommu_groups/*/devices/*/iommu_group

🧯 If You Can't Patch

  • Restrict physical access to devices to prevent local exploitation
  • Implement strict application sandboxing to limit potential impact of memory corruption

🔍 How to Verify

Check if Vulnerable:

Check chipset version and compare against Qualcomm's advisory. Use: cat /proc/cpuinfo | grep -i qualcomm

Check Version:

cat /proc/version && dmesg | grep -i qualcomm

Verify Fix Applied:

Verify firmware/software version matches patched versions listed in Qualcomm bulletin

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs related to IOMMU
  • DMA operation failures in system logs
  • Memory corruption errors in dmesg

Network Indicators:

  • None - this is a local memory corruption vulnerability

SIEM Query:

source="kernel" AND ("IOMMU" OR "DMA") AND ("panic" OR "corruption" OR "failure")

🔗 References

📤 Share & Export