CVE-2024-45540
📋 TL;DR
This vulnerability allows memory corruption through improper handling of IOCTL map buffer requests from userspace. Attackers could potentially execute arbitrary code or cause denial of service. This affects systems using Qualcomm components with vulnerable drivers.
💻 Affected Systems
- Qualcomm chipsets and associated drivers
📦 What is this software?
Snapdragon 4 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Platform Firmware →
Snapdragon 480 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 480 5g Mobile Platform Firmware →
Snapdragon 480\+ 5g Mobile Platform \(sm4350 Ac\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 480\+ 5g Mobile Platform \(sm4350 Ac\) Firmware →
Snapdragon 695 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 695 5g Mobile Platform Firmware →
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 865\+ 5g Mobile Platform \(sm8250 Ab\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 865\+ 5g Mobile Platform \(sm8250 Ab\) Firmware →
Snapdragon 870 5g Mobile Platform \(sm8250 Ac\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 870 5g Mobile Platform \(sm8250 Ac\) Firmware →
Snapdragon 888 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 888 5g Mobile Platform Firmware →
Snapdragon 888\+ 5g Mobile Platform \(sm8350 Ac\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 888\+ 5g Mobile Platform \(sm8350 Ac\) Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon W5\+ Gen 1 Wearable Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon W5\+ Gen 1 Wearable Platform Firmware →
Snapdragon X55 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf System Firmware →
Snapdragon Xr2 5g Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Xr2 5g Platform Firmware →
Video Collaboration Vc1 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc1 Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Local privilege escalation to kernel mode, allowing complete system compromise and persistence.
Likely Case
Local denial of service through system crash or instability.
If Mitigated
Limited impact if proper access controls restrict userspace IOCTL access.
🎯 Exploit Status
Requires local access and knowledge of driver internals to craft malicious IOCTL requests.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Qualcomm April 2025 security bulletin for specific patched versions.
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2025-bulletin.html
Restart Required: Yes
Instructions:
1. Check Qualcomm advisory for affected components.
2. Obtain updated drivers/firmware from device manufacturer.
3. Apply patches following manufacturer instructions.
4. Reboot system to load patched drivers.
🔧 Temporary Workarounds
Restrict IOCTL access
linuxLimit userspace access to vulnerable IOCTL interfaces through SELinux/AppArmor policies.
# Example SELinux policy to restrict ioctl access
# Requires custom policy development for specific driver
🧯 If You Can't Patch
- Implement strict access controls to limit which users can interact with device drivers.
- Monitor system logs for unusual IOCTL activity and driver crashes.
🔍 How to Verify
Check if Vulnerable:
Check Qualcomm component versions against advisory; examine driver versions in /sys/class or via modinfo.
Check Version:
modinfo [driver_name] | grep version # For kernel modules
Verify Fix Applied:
Verify driver versions match patched versions from Qualcomm bulletin; test IOCTL functionality.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- Driver crash messages in dmesg
- Unusual IOCTL calls in audit logs
Network Indicators:
- Not applicable - local exploitation only
SIEM Query:
source="kernel" AND ("panic" OR "Oops" OR "general protection fault") AND process="[driver_name]"