CVE-2024-43052

7.8 HIGH

📋 TL;DR

This vulnerability allows memory corruption in Qualcomm NPU (Neural Processing Unit) drivers when processing API calls with invalid input. Attackers could potentially execute arbitrary code or cause denial of service on affected devices. This affects devices using Qualcomm chipsets with NPU capabilities.

💻 Affected Systems

Products:
  • Qualcomm chipsets with NPU capabilities
Versions: Specific affected versions not publicly detailed in bulletin
Operating Systems: Android, Linux-based systems using Qualcomm chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with Qualcomm NPU hardware. Exact chipset models not specified in public bulletin.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with kernel privileges leading to complete device compromise

🟠

Likely Case

Local privilege escalation or denial of service affecting NPU functionality

🟢

If Mitigated

Limited impact with proper input validation and memory protections

🌐 Internet-Facing: LOW (requires local access or malicious app installation)
🏢 Internal Only: MEDIUM (could be exploited by malicious apps or local attackers)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to make API calls to NPU driver with crafted input. Likely requires local access or malicious app.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm December 2024 security bulletin

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/december-2024-bulletin.html

Restart Required: Yes

Instructions:

1. Check with device manufacturer for firmware updates. 2. Apply Qualcomm-provided patches through OEM updates. 3. Reboot device after update.

🔧 Temporary Workarounds

Restrict NPU API access

Android/Linux

Limit which applications can access NPU APIs through SELinux/AppArmor policies

🧯 If You Can't Patch

  • Implement strict application vetting and sandboxing
  • Monitor for unusual NPU API usage patterns

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Qualcomm security bulletin

Check Version:

Device-specific (e.g., Android: Settings > About phone > Build number)

Verify Fix Applied:

Verify firmware version includes December 2024 or later security patches

📡 Detection & Monitoring

Log Indicators:

  • Kernel crashes related to NPU driver
  • Unusual NPU API call patterns

Network Indicators:

  • Not network exploitable

SIEM Query:

Search for kernel panic events or NPU driver exceptions

🔗 References

📤 Share & Export