CVE-2024-43066
📋 TL;DR
This CVE describes a use-after-free vulnerability (CWE-416) in Qualcomm components that occurs during file descriptor handling in listener registration/deregistration processes. Successful exploitation could allow local attackers to execute arbitrary code or cause denial of service. This affects devices using vulnerable Qualcomm chipsets and drivers.
💻 Affected Systems
- Qualcomm chipsets and associated drivers/firmware
📦 What is this software?
Qualcomm 205 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Qualcomm 205 Mobile Platform Firmware →
Snapdragon 210 Processor Firmware by Qualcomm
Snapdragon 212 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 212 Mobile Platform Firmware →
Snapdragon 4 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Platform Firmware →
Snapdragon 429 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 429 Mobile Platform Firmware →
Snapdragon 460 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 460 Mobile Platform Firmware →
Snapdragon 480 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 480 5g Mobile Platform Firmware →
Snapdragon 480\+ 5g Mobile Platform \(sm4350 Ac\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 480\+ 5g Mobile Platform \(sm4350 Ac\) Firmware →
Snapdragon 660 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 660 Mobile Platform Firmware →
Snapdragon 662 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 662 Mobile Platform Firmware →
Snapdragon 680 4g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 680 4g Mobile Platform Firmware →
Snapdragon 685 4g Mobile Platform \(sm6225 Ad\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 685 4g Mobile Platform \(sm6225 Ad\) Firmware →
Snapdragon 695 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 695 5g Mobile Platform Firmware →
Snapdragon 820 Automotive Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 820 Automotive Platform Firmware →
Snapdragon 845 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 845 Mobile Platform Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 865\+ 5g Mobile Platform \(sm8250 Ab\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 865\+ 5g Mobile Platform \(sm8250 Ab\) Firmware →
Snapdragon 870 5g Mobile Platform \(sm8250 Ac\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 870 5g Mobile Platform \(sm8250 Ac\) Firmware →
Snapdragon Auto 4g Modem Firmware by Qualcomm
Snapdragon Auto 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Firmware →
Snapdragon W5\+ Gen 1 Wearable Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon W5\+ Gen 1 Wearable Platform Firmware →
Snapdragon X55 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf System Firmware →
Snapdragon Xr1 Platform Firmware by Qualcomm
Snapdragon Xr2 5g Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Xr2 5g Platform Firmware →
Video Collaboration Vc1 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc1 Platform Firmware →
Video Collaboration Vc3 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc3 Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Local privilege escalation to kernel-level code execution, potentially leading to complete system compromise and persistent access.
Likely Case
Local denial of service (system crash/reboot) or limited privilege escalation within the affected process context.
If Mitigated
System remains stable with no privilege escalation if proper access controls and exploit mitigations are in place.
🎯 Exploit Status
Exploitation requires local access and knowledge of memory layout; no public exploit code is currently known.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm April 2025 security bulletin for specific patched versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2025-bulletin.html
Restart Required: Yes
Instructions:
1. Check Qualcomm advisory for affected components. 2. Obtain updated firmware/drivers from device manufacturer. 3. Apply patches according to manufacturer instructions. 4. Reboot system to activate fixes.
🔧 Temporary Workarounds
Restrict local access
allLimit local user access to systems with vulnerable Qualcomm components
Enable exploit mitigations
linuxEnable ASLR, stack canaries, and other memory protection mechanisms
echo 2 > /proc/sys/kernel/randomize_va_space
🧯 If You Can't Patch
- Implement strict access controls to limit local user privileges
- Monitor systems for unusual process behavior or crash events
🔍 How to Verify
Check if Vulnerable:
Check Qualcomm chipset/driver versions against advisory; examine system logs for related crashes
Check Version:
cat /proc/cpuinfo | grep -i qualcomm && dmesg | grep -i qualcomm
Verify Fix Applied:
Verify updated Qualcomm component versions match patched versions in advisory
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- Use-after-free error messages in dmesg
- Process crashes related to Qualcomm drivers
Network Indicators:
- None - this is a local vulnerability
SIEM Query:
source="kernel" AND ("use-after-free" OR "qualcomm" AND "panic")