CVE-2024-33061

6.8 MEDIUM

📋 TL;DR

This vulnerability allows information disclosure through improper handling of IOCTL calls in Qualcomm trusted execution environments. Attackers can potentially read sensitive memory contents from trusted VM processes. This affects devices with Qualcomm chipsets that use vulnerable trusted execution implementations.

💻 Affected Systems

Products:
  • Qualcomm chipsets with trusted execution environment features
Versions: Specific affected versions not detailed in reference; consult Qualcomm January 2025 bulletin
Operating Systems: Android, Linux-based systems using Qualcomm chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Qualcomm trusted execution environment implementation; impact varies by specific chipset and firmware configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of trusted execution environment secrets, including cryptographic keys, authentication tokens, and sensitive application data stored in secure memory regions.

🟠

Likely Case

Limited information disclosure of memory contents from trusted applications, potentially exposing session data, configuration information, or partial cryptographic material.

🟢

If Mitigated

No impact if proper access controls prevent unauthorized users from making IOCTL calls to the vulnerable component.

🌐 Internet-Facing: LOW - This requires local access or ability to execute code on the device, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Malicious local applications or compromised user sessions could exploit this to access sensitive information.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to make IOCTL calls to the vulnerable component, typically requiring local code execution or elevated privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm January 2025 security bulletin for specific patched versions

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html

Restart Required: Yes

Instructions:

1. Check Qualcomm January 2025 security bulletin for your specific chipset. 2. Obtain firmware/software updates from device manufacturer. 3. Apply updates following manufacturer instructions. 4. Reboot device to activate fixes.

🔧 Temporary Workarounds

Restrict IOCTL access

linux

Limit which processes can make IOCTL calls to trusted execution components

Device-specific SELinux/AppArmor policies required
Consult device manufacturer for specific configuration

🧯 If You Can't Patch

  • Implement strict application sandboxing to prevent untrusted applications from accessing privileged interfaces
  • Monitor for suspicious IOCTL calls to trusted execution environment components

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Qualcomm security bulletin; examine if trusted execution environment is enabled and vulnerable versions are present

Check Version:

Device-specific commands vary; typically 'getprop ro.build.version.security_patch' on Android or check /proc/version on Linux systems

Verify Fix Applied:

Verify firmware version has been updated to patched version listed in Qualcomm bulletin; test IOCTL handling in trusted execution environment

📡 Detection & Monitoring

Log Indicators:

  • Unusual IOCTL calls to trusted execution components
  • Failed trusted execution environment operations
  • Memory access violations in secure contexts

Network Indicators:

  • Not network exploitable; focus on local system monitoring

SIEM Query:

Process making unexpected IOCTL calls to trusted execution interfaces OR Failed trusted execution operations from untrusted contexts

🔗 References

📤 Share & Export