CVE-2024-43060

7.8 HIGH

📋 TL;DR

This CVE describes a memory corruption vulnerability in Qualcomm's voice activation system when sound model parameters are transferred from the HLOS (High-Level Operating System) to the ADSP (Audio Digital Signal Processor). Successful exploitation could allow attackers to execute arbitrary code with elevated privileges. This affects devices using Qualcomm chipsets with voice activation features.

💻 Affected Systems

Products:
  • Qualcomm chipsets with voice activation capabilities
Versions: Specific versions not publicly detailed in the reference
Operating Systems: Android and other mobile operating systems using Qualcomm chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Requires voice activation feature to be enabled and used. Affects both consumer and enterprise devices using vulnerable Qualcomm components.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing remote code execution with system-level privileges, potentially enabling persistent malware installation, data theft, or device bricking.

🟠

Likely Case

Local privilege escalation allowing attackers to gain elevated system access from a lower-privileged context, potentially leading to data compromise or further system exploitation.

🟢

If Mitigated

Limited impact with proper memory protection mechanisms and privilege separation in place, potentially causing only denial of service or system instability.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of memory corruption techniques. No public exploit code has been observed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm's March 2025 security bulletin for specific patch versions

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html

Restart Required: Yes

Instructions:

1. Check device manufacturer's security updates. 2. Apply Qualcomm firmware updates from device OEM. 3. Apply Android security patches from Google/device manufacturer. 4. Reboot device after updates.

🔧 Temporary Workarounds

Disable voice activation features

android

Temporarily disable voice activation, voice assistants, and related audio processing features to prevent triggering the vulnerable code path.

Restrict audio processing permissions

android

Limit which applications can access microphone and audio processing capabilities through system permissions.

🧯 If You Can't Patch

  • Isolate affected devices from sensitive networks and data
  • Implement strict application allowlisting to prevent malicious apps from exploiting the vulnerability

🔍 How to Verify

Check if Vulnerable:

Check device chipset information and compare against Qualcomm's affected component list in their security bulletin.

Check Version:

On Android: Settings > About phone > Android version > Security patch level

Verify Fix Applied:

Verify Android security patch level is March 2025 or later and check with device manufacturer for specific firmware updates.

📡 Detection & Monitoring

Log Indicators:

  • Unusual audio service crashes
  • ADSP subsystem errors
  • Memory corruption warnings in system logs

Network Indicators:

  • Unusual audio-related network traffic if voice features use cloud processing

SIEM Query:

source="android_system" AND (event="audio_service_crash" OR event="adsp_error" OR message="*memory corruption*")

🔗 References

📤 Share & Export