CVE-2024-33045

8.4 HIGH

📋 TL;DR

This vulnerability allows memory corruption when the BTFM client sends new messages over Slimbus to the ADSP in Qualcomm chipsets. Attackers could potentially execute arbitrary code or cause denial of service. Affects devices using vulnerable Qualcomm components.

💻 Affected Systems

Products:
  • Qualcomm chipsets with BTFM/Slimbus/ADSP components
Versions: Specific versions not detailed in reference; check Qualcomm advisory for exact affected versions.
Operating Systems: Android and other OS using Qualcomm chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with vulnerable Qualcomm firmware. Exact device models depend on chipset implementation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Device crash/reboot (denial of service) or limited code execution in ADSP context.

🟢

If Mitigated

Contained crash of ADSP subsystem without affecting main OS.

🌐 Internet-Facing: MEDIUM - Requires proximity or network access to device, but not directly internet-exposed.
🏢 Internal Only: HIGH - Local attackers or malicious apps could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires sending crafted messages to ADSP via Slimbus, which may require local access or app permissions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Qualcomm September 2024 security bulletin for specific patch versions.

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html

Restart Required: Yes

Instructions:

1. Check device manufacturer for firmware updates. 2. Apply Qualcomm-provided patches through OEM updates. 3. Reboot device after update.

🔧 Temporary Workarounds

Disable vulnerable components

all

Disable BTFM/Slimbus functionality if not required (may break Bluetooth/audio features).

Device-specific; consult manufacturer documentation

🧯 If You Can't Patch

  • Restrict physical and network access to affected devices.
  • Monitor for unusual ADSP/Slimbus activity and device crashes.

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Qualcomm advisory; examine dmesg/logcat for ADSP/Slimbus errors.

Check Version:

Device-specific; typically 'getprop' or manufacturer settings for Android.

Verify Fix Applied:

Verify firmware version is updated per Qualcomm bulletin; test BTFM functionality remains stable.

📡 Detection & Monitoring

Log Indicators:

  • ADSP crash logs
  • Slimbus communication errors
  • BTFM client failures

Network Indicators:

  • Unusual Bluetooth/Slimbus traffic patterns

SIEM Query:

Search for 'ADSP crash' or 'Slimbus error' in device logs.

🔗 References

📤 Share & Export