CVE-2024-38421

7.8 HIGH

📋 TL;DR

This vulnerability allows memory corruption while processing GPU commands in Qualcomm hardware, potentially enabling attackers to execute arbitrary code or cause denial of service. It affects devices using vulnerable Qualcomm GPU drivers across multiple product lines including smartphones, tablets, and embedded systems.

💻 Affected Systems

Products:
  • Qualcomm Adreno GPU-based devices
  • Snapdragon-powered smartphones/tablets
  • Qualcomm embedded/IoT devices
Versions: Multiple Qualcomm chipset versions prior to November 2024 security updates
Operating Systems: Android, Linux-based systems with Qualcomm drivers
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with vulnerable GPU driver versions; exact chipset list in Qualcomm advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise with kernel-level code execution, allowing complete control over affected systems and potential data exfiltration.

🟠

Likely Case

Local privilege escalation from user to kernel space, application crashes, or system instability requiring reboot.

🟢

If Mitigated

Limited to denial of service through application crashes if proper sandboxing and privilege separation are implemented.

🌐 Internet-Facing: LOW - Requires local access or malicious app installation; not directly exploitable over network.
🏢 Internal Only: MEDIUM - Malicious insider or compromised internal application could exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to execute GPU commands; typical exploitation would involve malicious application.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: November 2024 Qualcomm security updates

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html

Restart Required: Yes

Instructions:

1. Check device manufacturer for available updates. 2. Apply November 2024 Qualcomm security patch. 3. Reboot device after installation. 4. Verify patch level in system settings.

🔧 Temporary Workarounds

Restrict GPU access

all

Limit GPU command execution to trusted applications only

Application sandboxing

android

Enforce strict application isolation to prevent privilege escalation

🧯 If You Can't Patch

  • Isolate affected devices from critical networks
  • Implement application allowlisting to prevent untrusted GPU command execution

🔍 How to Verify

Check if Vulnerable:

Check Qualcomm security patch level in Android settings: Settings > About phone > Android version > Security patch level

Check Version:

On Android: adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify security patch level shows November 2024 or later

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • GPU driver crash reports
  • Unexpected privilege escalation attempts

Network Indicators:

  • Unusual outbound connections from system processes

SIEM Query:

source="kernel" AND ("GPU" OR "Adreno") AND ("panic" OR "crash" OR "corruption")

🔗 References

📤 Share & Export