CVE-2024-38423

7.8 HIGH

📋 TL;DR

This vulnerability allows memory corruption during GPU page table switching in Qualcomm GPU drivers. Attackers could potentially execute arbitrary code or cause denial of service. Affects devices using vulnerable Qualcomm GPU components.

💻 Affected Systems

Products:
  • Qualcomm GPU drivers
  • Devices with Qualcomm Adreno GPUs
Versions: Multiple versions prior to November 2024 security updates
Operating Systems: Android, Linux-based systems with Qualcomm GPUs
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with specific Qualcomm chipsets; check Qualcomm advisory for exact chipset list

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full device compromise, data theft, or persistent backdoor installation

🟠

Likely Case

Local privilege escalation, application crashes, or denial of service affecting GPU functionality

🟢

If Mitigated

Limited to denial of service if exploit attempts are blocked by security controls

🌐 Internet-Facing: LOW (requires local access or compromised application to trigger)
🏢 Internal Only: MEDIUM (could be exploited via malicious apps or local attackers)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access or ability to execute code; buffer overflow in GPU driver component

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: November 2024 security update or later

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html

Restart Required: Yes

Instructions:

1. Check device manufacturer for available updates 2. Apply November 2024 or later security patch 3. Reboot device 4. Verify GPU driver version is updated

🔧 Temporary Workarounds

Restrict GPU access

all

Limit which applications can access GPU hardware features

Application sandboxing

all

Enforce strict application isolation to prevent privilege escalation

🧯 If You Can't Patch

  • Isolate affected devices from critical networks
  • Implement application allowlisting to prevent untrusted code execution

🔍 How to Verify

Check if Vulnerable:

Check GPU driver version against Qualcomm security bulletin; devices with pre-November 2024 patches are vulnerable

Check Version:

On Android: adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify November 2024 or later security patch is installed and GPU driver version matches patched version

📡 Detection & Monitoring

Log Indicators:

  • GPU driver crashes
  • Unexpected memory access violations in GPU subsystem
  • Kernel panic related to GPU

Network Indicators:

  • None (local exploitation only)

SIEM Query:

Device logs showing GPU driver exceptions or crashes with Qualcomm/Adreno components

🔗 References

📤 Share & Export