CVE-2024-45549

7.7 HIGH

📋 TL;DR

This vulnerability allows unauthorized information disclosure when creating MQ channels in affected Qualcomm products. Attackers can potentially access sensitive data that should be protected. This affects systems using vulnerable Qualcomm components with MQ channel functionality.

💻 Affected Systems

Products:
  • Qualcomm products with MQ channel functionality
Versions: Specific versions not detailed in reference; check Qualcomm April 2025 bulletin
Operating Systems: Android, Linux-based systems with Qualcomm components
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where MQ channel creation functionality is enabled. Exact product list requires checking Qualcomm's detailed advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete exposure of sensitive data including credentials, configuration details, and potentially proprietary information through MQ channel creation.

🟠

Likely Case

Partial information disclosure revealing system configuration, network details, or limited sensitive data through MQ channel operations.

🟢

If Mitigated

Minimal impact with proper access controls and network segmentation limiting exposure of sensitive information.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to create or manipulate MQ channels. No public exploit code available as of reference date.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Qualcomm April 2025 security bulletin for specific patched versions

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2025-bulletin.html

Restart Required: Yes

Instructions:

1. Review Qualcomm April 2025 security bulletin for affected products. 2. Obtain appropriate firmware/software updates from Qualcomm or device manufacturer. 3. Apply patches following vendor instructions. 4. Reboot affected systems.

🔧 Temporary Workarounds

Disable unnecessary MQ channel creation

all

Restrict MQ channel creation to authorized processes only

# Review and modify MQ configuration to limit channel creation
# Implement access controls on MQ services

Network segmentation

all

Isolate systems with MQ functionality from untrusted networks

# Implement firewall rules to restrict access to MQ ports
# Use VLANs to separate MQ traffic

🧯 If You Can't Patch

  • Implement strict access controls on MQ channel creation functionality
  • Monitor MQ channel creation logs for suspicious activity and implement alerting

🔍 How to Verify

Check if Vulnerable:

Check system against Qualcomm's affected product list in April 2025 bulletin. Review MQ configuration and version information.

Check Version:

# Check Qualcomm component versions specific to your device/platform

Verify Fix Applied:

Verify patched version is installed and MQ channel creation no longer discloses sensitive information. Test with authorized channel creation attempts.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized MQ channel creation attempts
  • Unexpected information in MQ channel logs
  • Failed authentication attempts on MQ services

Network Indicators:

  • Unusual MQ protocol traffic patterns
  • Unexpected connections to MQ ports

SIEM Query:

search 'MQ channel creation' OR 'Qualcomm MQ' | filter by suspicious source IPs or unusual timing

🔗 References

📤 Share & Export