CVE-2024-33035
📋 TL;DR
This vulnerability allows memory corruption in Qualcomm's gralloc memory allocator when clients request extremely high reserved sizes. Attackers could exploit this to execute arbitrary code or cause denial of service. Affected systems include devices using Qualcomm chipsets with vulnerable graphics memory management.
💻 Affected Systems
- Qualcomm chipsets with vulnerable gralloc implementation
📦 What is this software?
Snapdragon 4 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Platform Firmware →
Snapdragon 4 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 2 Mobile Platform Firmware →
Snapdragon 460 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 460 Mobile Platform Firmware →
Snapdragon 480 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 480 5g Mobile Platform Firmware →
Snapdragon 480\+ 5g Mobile Platform \(sm4350 Ac\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 480\+ 5g Mobile Platform \(sm4350 Ac\) Firmware →
Snapdragon 662 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 662 Mobile Platform Firmware →
Snapdragon 680 4g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 680 4g Mobile Platform Firmware →
Snapdragon 685 4g Mobile Platform \(sm6225 Ad\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 685 4g Mobile Platform \(sm6225 Ad\) Firmware →
Snapdragon 695 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 695 5g Mobile Platform Firmware →
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 865\+ 5g Mobile Platform \(sm8250 Ab\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 865\+ 5g Mobile Platform \(sm8250 Ab\) Firmware →
Snapdragon 870 5g Mobile Platform \(sm8250 Ac\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 870 5g Mobile Platform \(sm8250 Ac\) Firmware →
Snapdragon W5\+ Gen 1 Wearable Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon W5\+ Gen 1 Wearable Platform Firmware →
Snapdragon X55 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf System Firmware →
Snapdragon Xr2 5g Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Xr2 5g Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, privilege escalation, or persistent malware installation.
Likely Case
Application crashes, denial of service, or limited memory corruption affecting specific processes.
If Mitigated
Controlled crashes without privilege escalation if proper memory isolation and exploit mitigations are in place.
🎯 Exploit Status
Exploitation requires triggering specific memory allocation patterns. No public exploits known as of advisory publication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm September 2024 security bulletin for specific patched versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html
Restart Required: Yes
Instructions:
1. Check Qualcomm advisory for affected chipset/firmware versions. 2. Obtain updated firmware from device manufacturer. 3. Apply firmware update following manufacturer instructions. 4. Reboot device to activate fixes.
🔧 Temporary Workarounds
Memory allocation restrictions
allImplement input validation to reject excessively large memory allocation requests
Configuration dependent - implement in application code or system libraries
🧯 If You Can't Patch
- Isolate affected systems from untrusted networks and users
- Implement strict application sandboxing to limit impact of potential exploitation
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against Qualcomm's advisory. Use: adb shell getprop ro.build.fingerprint (for Android devices)
Check Version:
adb shell getprop ro.build.fingerprint OR check device firmware settings
Verify Fix Applied:
Verify firmware version has been updated to patched version listed in Qualcomm advisory
📡 Detection & Monitoring
Log Indicators:
- Unexpected process crashes related to graphics/memory allocation
- Kernel panic logs mentioning memory corruption
Network Indicators:
- Unusual outbound connections following graphics-related process crashes
SIEM Query:
Process:Name CONTAINS 'gralloc' AND EventID:1000 (Application Crash)