CVE-2024-33035

8.4 HIGH

📋 TL;DR

This vulnerability allows memory corruption in Qualcomm's gralloc memory allocator when clients request extremely high reserved sizes. Attackers could exploit this to execute arbitrary code or cause denial of service. Affected systems include devices using Qualcomm chipsets with vulnerable graphics memory management.

💻 Affected Systems

Products:
  • Qualcomm chipsets with vulnerable gralloc implementation
Versions: Specific versions not publicly detailed; refer to Qualcomm September 2024 bulletin
Operating Systems: Android and other OS using Qualcomm graphics components
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where gralloc clients can request memory allocations. Exact chipset models and firmware versions require checking Qualcomm's advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, privilege escalation, or persistent malware installation.

🟠

Likely Case

Application crashes, denial of service, or limited memory corruption affecting specific processes.

🟢

If Mitigated

Controlled crashes without privilege escalation if proper memory isolation and exploit mitigations are in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering specific memory allocation patterns. No public exploits known as of advisory publication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm September 2024 security bulletin for specific patched versions

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html

Restart Required: Yes

Instructions:

1. Check Qualcomm advisory for affected chipset/firmware versions. 2. Obtain updated firmware from device manufacturer. 3. Apply firmware update following manufacturer instructions. 4. Reboot device to activate fixes.

🔧 Temporary Workarounds

Memory allocation restrictions

all

Implement input validation to reject excessively large memory allocation requests

Configuration dependent - implement in application code or system libraries

🧯 If You Can't Patch

  • Isolate affected systems from untrusted networks and users
  • Implement strict application sandboxing to limit impact of potential exploitation

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Qualcomm's advisory. Use: adb shell getprop ro.build.fingerprint (for Android devices)

Check Version:

adb shell getprop ro.build.fingerprint OR check device firmware settings

Verify Fix Applied:

Verify firmware version has been updated to patched version listed in Qualcomm advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process crashes related to graphics/memory allocation
  • Kernel panic logs mentioning memory corruption

Network Indicators:

  • Unusual outbound connections following graphics-related process crashes

SIEM Query:

Process:Name CONTAINS 'gralloc' AND EventID:1000 (Application Crash)

🔗 References

📤 Share & Export