CVE-2024-33045
📋 TL;DR
This vulnerability allows memory corruption when the BTFM client sends new messages over Slimbus to the ADSP in Qualcomm chipsets. Attackers could potentially execute arbitrary code or cause denial of service. Affects devices using vulnerable Qualcomm components.
💻 Affected Systems
- Qualcomm chipsets with BTFM/Slimbus/ADSP components
📦 What is this software?
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon Auto 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon X35 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X35 5g Modem Rf System Firmware →
Snapdragon X62 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X62 5g Modem Rf System Firmware →
Snapdragon X65 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf System Firmware →
Video Collaboration Vc1 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc1 Platform Firmware →
Video Collaboration Vc3 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc3 Platform Firmware →
Video Collaboration Vc5 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc5 Platform Firmware →
Vision Intelligence 400 Firmware by Qualcomm
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete device compromise, data theft, or persistent backdoor installation.
Likely Case
Device crash/reboot (denial of service) or limited code execution in ADSP context.
If Mitigated
Contained crash of ADSP subsystem without affecting main OS.
🎯 Exploit Status
Exploitation requires sending crafted messages to ADSP via Slimbus, which may require local access or app permissions.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Qualcomm September 2024 security bulletin for specific patch versions.
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html
Restart Required: Yes
Instructions:
1. Check device manufacturer for firmware updates. 2. Apply Qualcomm-provided patches through OEM updates. 3. Reboot device after update.
🔧 Temporary Workarounds
Disable vulnerable components
allDisable BTFM/Slimbus functionality if not required (may break Bluetooth/audio features).
Device-specific; consult manufacturer documentation
🧯 If You Can't Patch
- Restrict physical and network access to affected devices.
- Monitor for unusual ADSP/Slimbus activity and device crashes.
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against Qualcomm advisory; examine dmesg/logcat for ADSP/Slimbus errors.
Check Version:
Device-specific; typically 'getprop' or manufacturer settings for Android.
Verify Fix Applied:
Verify firmware version is updated per Qualcomm bulletin; test BTFM functionality remains stable.
📡 Detection & Monitoring
Log Indicators:
- ADSP crash logs
- Slimbus communication errors
- BTFM client failures
Network Indicators:
- Unusual Bluetooth/Slimbus traffic patterns
SIEM Query:
Search for 'ADSP crash' or 'Slimbus error' in device logs.