CVE-2024-45553
📋 TL;DR
This CVE describes a use-after-free vulnerability in Qualcomm components where memory corruption can occur when process-specific maps are improperly handled in global lists. If exploited, it could allow attackers to execute arbitrary code or cause denial of service. This affects devices using vulnerable Qualcomm chipsets and drivers.
💻 Affected Systems
- Qualcomm chipsets and associated drivers/firmware
📦 What is this software?
Snapdragon 4 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Firmware →
Snapdragon 4 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 2 Mobile Firmware →
Snapdragon 480 5g Mobile Firmware by Qualcomm
Snapdragon 480 5g Mobile Firmware by Qualcomm
Snapdragon 680 4g Mobile Firmware by Qualcomm
Snapdragon 685 4g Mobile Firmware by Qualcomm
Snapdragon 695 5g Mobile Firmware by Qualcomm
Snapdragon 8 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Firmware →
Snapdragon 8 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Firmware →
Snapdragon 8 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Firmware →
Snapdragon 8 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Firmware →
Snapdragon 8 Gen 3 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon W5\+ Gen 1 Wearable Firmware by Qualcomm
View all CVEs affecting Snapdragon W5\+ Gen 1 Wearable Firmware →
Snapdragon X35 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X35 5g Modem Rf Firmware →
Snapdragon X72 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X72 5g Modem Rf Firmware →
Snapdragon X75 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with kernel privileges leading to complete system compromise, data theft, or persistent backdoor installation.
Likely Case
Local privilege escalation allowing attackers to gain elevated permissions on affected devices.
If Mitigated
Denial of service through system crashes or instability if exploitation attempts are blocked.
🎯 Exploit Status
Requires local access and timing precision to trigger the race condition between thread operations on global lists.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Qualcomm January 2025 security bulletin for specific patched versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html
Restart Required: Yes
Instructions:
1. Check Qualcomm January 2025 security bulletin for your specific chipset/driver. 2. Obtain updated firmware/drivers from device manufacturer or Qualcomm. 3. Apply patches following vendor instructions. 4. Reboot affected devices.
🔧 Temporary Workarounds
Disable vulnerable components
Linux-based systemsIf possible, disable or blacklist the specific Qualcomm driver/module containing the vulnerability
modprobe -r [vulnerable_module]
echo 'blacklist [vulnerable_module]' >> /etc/modprobe.d/blacklist.conf
🧯 If You Can't Patch
- Implement strict access controls to limit local user privileges on affected devices
- Monitor for unusual process behavior or privilege escalation attempts using security tools
🔍 How to Verify
Check if Vulnerable:
Check Qualcomm chipset/driver version against affected versions in January 2025 bulletin
Check Version:
cat /sys/devices/soc0/*version* or check device firmware information
Verify Fix Applied:
Verify installed Qualcomm driver/firmware version matches patched versions from bulletin
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- Driver crash messages
- Unexpected privilege escalation events
Network Indicators:
- None - this is a local vulnerability
SIEM Query:
Search for kernel/driver crash events or privilege escalation patterns on devices with Qualcomm hardware