CVE-2024-45549
📋 TL;DR
This vulnerability allows unauthorized information disclosure when creating MQ channels in affected Qualcomm products. Attackers can potentially access sensitive data that should be protected. This affects systems using vulnerable Qualcomm components with MQ channel functionality.
💻 Affected Systems
- Qualcomm products with MQ channel functionality
📦 What is this software?
Snapdragon 4 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 2 Mobile Platform Firmware →
Snapdragon 429 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 429 Mobile Platform Firmware →
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 8 Gen 1 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 3 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Platform Firmware →
Snapdragon 865 5g Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 865 5g Mobile Platform Firmware →
Snapdragon 865\+ 5g Mobile Platform \(sm8250 Ab\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 865\+ 5g Mobile Platform \(sm8250 Ab\) Firmware →
Snapdragon 870 5g Mobile Platform \(sm8250 Ac\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 870 5g Mobile Platform \(sm8250 Ac\) Firmware →
Snapdragon 8cx Gen 3 Compute Platform \(sc8280xp Ab\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 8cx Gen 3 Compute Platform \(sc8280xp Ab\) Firmware →
Snapdragon 8cx Gen 3 Compute Platform \(sc8280xp Bb\) Firmware by Qualcomm
View all CVEs affecting Snapdragon 8cx Gen 3 Compute Platform \(sc8280xp Bb\) Firmware →
Snapdragon Ar1 Gen 1 Platform \"luna1\" Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar1 Gen 1 Platform \"luna1\" Firmware →
Snapdragon Ar1 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar1 Gen 1 Platform Firmware →
Snapdragon Ar2 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar2 Gen 1 Platform Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon Wear 4100\+ Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Wear 4100\+ Platform Firmware →
Snapdragon X35 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X35 5g Modem Rf System Firmware →
Snapdragon X55 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf System Firmware →
Snapdragon X62 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X62 5g Modem Rf System Firmware →
Snapdragon X65 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf System Firmware →
Snapdragon X70 Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X70 Modem Rf System Firmware →
Snapdragon X72 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X72 5g Modem Rf System Firmware →
Snapdragon X75 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf System Firmware →
Snapdragon Xr2 5g Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Xr2 5g Platform Firmware →
Snapdragon Xr2\+ Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Xr2\+ Gen 1 Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete exposure of sensitive data including credentials, configuration details, and potentially proprietary information through MQ channel creation.
Likely Case
Partial information disclosure revealing system configuration, network details, or limited sensitive data through MQ channel operations.
If Mitigated
Minimal impact with proper access controls and network segmentation limiting exposure of sensitive information.
🎯 Exploit Status
Exploitation requires ability to create or manipulate MQ channels. No public exploit code available as of reference date.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Qualcomm April 2025 security bulletin for specific patched versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2025-bulletin.html
Restart Required: Yes
Instructions:
1. Review Qualcomm April 2025 security bulletin for affected products. 2. Obtain appropriate firmware/software updates from Qualcomm or device manufacturer. 3. Apply patches following vendor instructions. 4. Reboot affected systems.
🔧 Temporary Workarounds
Disable unnecessary MQ channel creation
allRestrict MQ channel creation to authorized processes only
# Review and modify MQ configuration to limit channel creation
# Implement access controls on MQ services
Network segmentation
allIsolate systems with MQ functionality from untrusted networks
# Implement firewall rules to restrict access to MQ ports
# Use VLANs to separate MQ traffic
🧯 If You Can't Patch
- Implement strict access controls on MQ channel creation functionality
- Monitor MQ channel creation logs for suspicious activity and implement alerting
🔍 How to Verify
Check if Vulnerable:
Check system against Qualcomm's affected product list in April 2025 bulletin. Review MQ configuration and version information.
Check Version:
# Check Qualcomm component versions specific to your device/platform
Verify Fix Applied:
Verify patched version is installed and MQ channel creation no longer discloses sensitive information. Test with authorized channel creation attempts.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized MQ channel creation attempts
- Unexpected information in MQ channel logs
- Failed authentication attempts on MQ services
Network Indicators:
- Unusual MQ protocol traffic patterns
- Unexpected connections to MQ ports
SIEM Query:
search 'MQ channel creation' OR 'Qualcomm MQ' | filter by suspicious source IPs or unusual timing