CVE-2024-43050
📋 TL;DR
This vulnerability allows local attackers to cause memory corruption in WLAN drivers by sending specially crafted IOCTL calls. It affects systems with Qualcomm wireless chipsets, potentially leading to privilege escalation or denial of service. Attackers need local access to exploit this vulnerability.
💻 Affected Systems
- Qualcomm WLAN chipsets and associated drivers
📦 What is this software?
Snapdragon 429 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 429 Mobile Platform Firmware →
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon 8c Compute Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8c Compute Platform Firmware →
Snapdragon 8cx Compute Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8cx Compute Platform Firmware →
Snapdragon 8cx Gen 2 5g Compute Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8cx Gen 2 5g Compute Platform Firmware →
Snapdragon 8cx Gen 2 5g Compute Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8cx Gen 2 5g Compute Platform Firmware →
Snapdragon 8cx Gen 3 Compute Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8cx Gen 3 Compute Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Privilege escalation to kernel-level access, allowing complete system compromise and potential persistence mechanisms.
Likely Case
Local denial of service through kernel panic or system crash, requiring physical or remote console access to recover.
If Mitigated
Limited impact with proper access controls preventing unauthorized local users from executing IOCTL commands.
🎯 Exploit Status
Requires understanding of WLAN driver internals and IOCTL interface to craft malicious commands.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Qualcomm security bulletin for specific patched versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html
Restart Required: No
Instructions:
1. Check Qualcomm advisory for affected chipset/driver versions. 2. Obtain updated driver/firmware from device manufacturer. 3. Apply update following manufacturer instructions. 4. Verify driver version after update.
🔧 Temporary Workarounds
Restrict IOCTL access
LinuxLimit access to WLAN driver IOCTL interface to privileged users only
chmod 600 /dev/wlan
setfacl -m u:root:rw- /dev/wlan
🧯 If You Can't Patch
- Implement strict access controls to prevent unauthorized users from accessing WLAN driver interfaces
- Monitor for unusual IOCTL calls to WLAN driver and investigate suspicious activity
🔍 How to Verify
Check if Vulnerable:
Check Qualcomm chipset version and WLAN driver version against advisory; examine if factory test IOCTL commands are accessible
Check Version:
modinfo wlan | grep version OR dmesg | grep -i qualcomm
Verify Fix Applied:
Verify updated driver version matches patched version from Qualcomm advisory; test that factory test IOCTL commands are properly validated
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs mentioning WLAN driver
- IOCTL calls to WLAN driver with unusual parameters
- Failed factory test command attempts
Network Indicators:
- Unusual local system crashes affecting wireless connectivity
SIEM Query:
source="kernel" AND "WLAN" AND ("panic" OR "IOCTL" OR "factory test")