CVE-2024-23378

6.7 MEDIUM

📋 TL;DR

This vulnerability allows memory corruption through IOCTL calls to the MSM module during audio operations on Qualcomm devices. Attackers could potentially execute arbitrary code or cause denial of service. It affects Android devices with Qualcomm chipsets that use the vulnerable audio driver.

💻 Affected Systems

Products:
  • Android devices with Qualcomm Snapdragon chipsets
Versions: Multiple Qualcomm chipset versions (specific versions not publicly detailed)
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Requires audio playback/record functionality to be active. Affects devices using Qualcomm's MSM audio driver module.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to kernel mode, allowing complete device compromise including data theft, persistence, and disabling security controls.

🟠

Likely Case

Application crash or denial of service affecting audio functionality, potentially requiring device reboot.

🟢

If Mitigated

Limited impact with proper SELinux policies and kernel hardening preventing privilege escalation.

🌐 Internet-Facing: LOW - Requires local access to device, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Malicious apps or users with physical access could exploit this vulnerability locally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to make IOCTL calls to the vulnerable driver. No public exploit code available as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Qualcomm October 2024 security bulletin patches

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html

Restart Required: Yes

Instructions:

1. Check device manufacturer for available security updates. 2. Apply October 2024 or later Qualcomm security patches. 3. Reboot device after patch installation. 4. Verify patch is applied through device security settings.

🔧 Temporary Workarounds

Disable vulnerable audio modules

linux

Temporarily disable MSM audio driver module to prevent exploitation

rmmod msm_audio_module
echo 'blacklist msm_audio_module' > /etc/modprobe.d/disable_msm.conf

Restrict IOCTL permissions

linux

Limit access to audio device nodes

chmod 600 /dev/msm_audio*
chown root:root /dev/msm_audio*

🧯 If You Can't Patch

  • Implement strict SELinux policies to restrict audio driver access
  • Monitor for suspicious audio driver IOCTL calls and application crashes

🔍 How to Verify

Check if Vulnerable:

Check device security patch level in Settings > About phone > Android security patch level. If before October 2024, likely vulnerable.

Check Version:

getprop ro.build.version.security_patch

Verify Fix Applied:

Verify security patch level shows October 2024 or later. Check that audio functionality works normally after patch.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • Audio service crashes
  • Suspicious IOCTL calls to /dev/msm_audio*

Network Indicators:

  • None - local exploitation only

SIEM Query:

source="kernel" AND ("msm_audio" OR "audio driver crash")

🔗 References

📤 Share & Export