CVE-2024-43052
📋 TL;DR
This vulnerability allows memory corruption in Qualcomm NPU (Neural Processing Unit) drivers when processing API calls with invalid input. Attackers could potentially execute arbitrary code or cause denial of service on affected devices. This affects devices using Qualcomm chipsets with NPU capabilities.
💻 Affected Systems
- Qualcomm chipsets with NPU capabilities
📦 What is this software?
Smart Audio 200 Platform Firmware by Qualcomm
Snapdragon 208 Processor Firmware by Qualcomm
Snapdragon 210 Processor Firmware by Qualcomm
Snapdragon 212 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 212 Mobile Platform Firmware →
Snapdragon 425 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 425 Mobile Platform Firmware →
Snapdragon 427 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 427 Mobile Platform Firmware →
Snapdragon 429 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 429 Mobile Platform Firmware →
Snapdragon 430 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 430 Mobile Platform Firmware →
Snapdragon 435 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 435 Mobile Platform Firmware →
Snapdragon 439 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 439 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 3 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Platform Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 870 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 870 5g Mobile Platform Firmware →
Snapdragon Wear 2100 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Wear 2100 Platform Firmware →
Snapdragon Wear 2500 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Wear 2500 Platform Firmware →
Snapdragon Wear 3100 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Wear 3100 Platform Firmware →
Snapdragon Wear 4100\+ Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Wear 4100\+ Platform Firmware →
Snapdragon X55 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf System Firmware →
Snapdragon Xr2 5g Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Xr2 5g Platform Firmware →
Snapdragon Xr2\+ Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Xr2\+ Gen 1 Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with kernel privileges leading to complete device compromise
Likely Case
Local privilege escalation or denial of service affecting NPU functionality
If Mitigated
Limited impact with proper input validation and memory protections
🎯 Exploit Status
Requires ability to make API calls to NPU driver with crafted input. Likely requires local access or malicious app.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm December 2024 security bulletin
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html
Restart Required: Yes
Instructions:
1. Check with device manufacturer for firmware updates. 2. Apply Qualcomm-provided patches through OEM updates. 3. Reboot device after update.
🔧 Temporary Workarounds
Restrict NPU API access
Android/LinuxLimit which applications can access NPU APIs through SELinux/AppArmor policies
🧯 If You Can't Patch
- Implement strict application vetting and sandboxing
- Monitor for unusual NPU API usage patterns
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against Qualcomm security bulletin
Check Version:
Device-specific (e.g., Android: Settings > About phone > Build number)
Verify Fix Applied:
Verify firmware version includes December 2024 or later security patches
📡 Detection & Monitoring
Log Indicators:
- Kernel crashes related to NPU driver
- Unusual NPU API call patterns
Network Indicators:
- Not network exploitable
SIEM Query:
Search for kernel panic events or NPU driver exceptions