CVE-2024-23375

6.7 MEDIUM

📋 TL;DR

This CVE describes a memory corruption vulnerability in Qualcomm network scanning functionality that could allow an attacker to execute arbitrary code or cause denial of service. It affects devices using Qualcomm chipsets with vulnerable firmware. The vulnerability occurs during network scan requests.

💻 Affected Systems

Products:
  • Qualcomm chipsets with vulnerable firmware
Versions: Specific versions not detailed in reference; check Qualcomm October 2024 bulletin
Operating Systems: Android, Linux-based systems using Qualcomm chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with Qualcomm wireless components that perform network scanning. Exact product list requires checking Qualcomm's detailed advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Denial of service causing device crashes or instability, potentially requiring physical reset.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation attempts.

🌐 Internet-Facing: MEDIUM - Requires network access but could be exploited via malicious network packets if device is exposed.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Memory corruption vulnerabilities typically require specific conditions to achieve reliable exploitation. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Qualcomm October 2024 security bulletin for specific patched versions

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html

Restart Required: Yes

Instructions:

1. Check Qualcomm October 2024 security bulletin for your specific chipset. 2. Obtain firmware update from device manufacturer. 3. Apply firmware update following manufacturer instructions. 4. Reboot device to complete installation.

🔧 Temporary Workarounds

Disable unnecessary network scanning

all

Reduce attack surface by limiting network scanning functionality where not required

Network segmentation

all

Isolate affected devices from untrusted networks to prevent exploitation attempts

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can communicate with affected devices
  • Monitor for abnormal network scanning behavior or device crashes that might indicate exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Qualcomm's October 2024 security bulletin for your specific chipset model

Check Version:

Device-specific commands vary by manufacturer; typically 'cat /proc/version' or checking device settings > about phone > software information

Verify Fix Applied:

Verify firmware version has been updated to a version listed as patched in Qualcomm's advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device reboots
  • Kernel panic logs
  • Memory corruption error messages in system logs

Network Indicators:

  • Abnormal network scan patterns
  • Unexpected network packets to wireless interfaces

SIEM Query:

Search for: (event_category:crash OR error:memory_corruption) AND device_vendor:Qualcomm

🔗 References

📤 Share & Export