CVE-2024-43048
📋 TL;DR
This vulnerability allows memory corruption when invalid input is passed to the GPU Headroom API call in Qualcomm components. Attackers could potentially execute arbitrary code or cause denial of service. Affects devices using vulnerable Qualcomm GPU drivers.
💻 Affected Systems
- Qualcomm GPU drivers
- Devices with Qualcomm Adreno GPUs
📦 What is this software?
Snapdragon 4 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Platform Firmware →
Snapdragon 429 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 429 Mobile Platform Firmware →
Snapdragon 460 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 460 Mobile Platform Firmware →
Snapdragon 480 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 480 5g Mobile Platform Firmware →
Snapdragon 480 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 480 5g Mobile Platform Firmware →
Snapdragon 662 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 662 Mobile Platform Firmware →
Snapdragon 680 4g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 680 4g Mobile Platform Firmware →
Snapdragon 685 4g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 685 4g Mobile Platform Firmware →
Snapdragon 695 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 695 5g Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 3 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to full device compromise, data theft, or persistent backdoor installation
Likely Case
Application crash or denial of service affecting GPU functionality
If Mitigated
Contained crash within the GPU driver process without system-wide impact
🎯 Exploit Status
Requires ability to call GPU Headroom API with crafted input; likely requires local application execution
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Qualcomm December 2024 security bulletin for specific patched versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html
Restart Required: No
Instructions:
1. Check Qualcomm advisory for affected chipset/device 2. Obtain updated GPU driver from device manufacturer 3. Apply driver update through standard system update process
🔧 Temporary Workarounds
Restrict GPU API access
Android/LinuxLimit which applications can access GPU Headroom API through SELinux/AppArmor policies
🧯 If You Can't Patch
- Implement strict application vetting and sandboxing
- Monitor for abnormal GPU driver crashes or memory usage patterns
🔍 How to Verify
Check if Vulnerable:
Check device chipset against Qualcomm advisory and verify GPU driver version
Check Version:
adb shell dumpsys gpu (Android) or check /sys/class/kgsl/kgsl-3d0/version (Linux)
Verify Fix Applied:
Verify GPU driver version matches patched version in Qualcomm bulletin
📡 Detection & Monitoring
Log Indicators:
- GPU driver crashes
- Memory corruption errors in kernel logs
- Abnormal GPU API calls
Network Indicators:
- Unusual outbound connections following GPU driver crashes
SIEM Query:
source="kernel" AND ("GPU" OR "kgsl") AND ("crash" OR "corruption" OR "panic")