CVE-2024-45563

6.6 MEDIUM

📋 TL;DR

This vulnerability allows memory corruption in Qualcomm Camera Request Manager (CRM) when handling schedule requests due to an invalid link count in sessions. Attackers could potentially execute arbitrary code or cause denial of service on affected devices. This affects devices using Qualcomm chipsets with vulnerable camera firmware.

💻 Affected Systems

Products:
  • Qualcomm chipsets with Camera Request Manager (CRM) component
Versions: Specific versions not detailed in reference; affected versions prior to May 2025 patches
Operating Systems: Android, Linux-based systems using Qualcomm camera drivers
Default Config Vulnerable: ⚠️ Yes
Notes: Requires camera functionality to be enabled and accessible to malicious actors.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Application crash or denial of service affecting camera functionality, potentially requiring device reboot.

🟢

If Mitigated

Limited impact with proper sandboxing and privilege separation, potentially just camera app crashes.

🌐 Internet-Facing: MEDIUM - Requires camera access which could be triggered via malicious apps or web content with camera permissions.
🏢 Internal Only: MEDIUM - Local apps with camera permissions could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires camera access permissions and knowledge of memory corruption techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches included in May 2025 Qualcomm security bulletin

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2025-bulletin.html

Restart Required: Yes

Instructions:

1. Check with device manufacturer for firmware updates. 2. Apply Qualcomm-provided patches through OEM updates. 3. Reboot device after update installation.

🔧 Temporary Workarounds

Restrict camera permissions

all

Limit camera access to trusted applications only

Disable unnecessary camera features

all

Turn off camera functionality when not in use

🧯 If You Can't Patch

  • Implement strict application sandboxing and privilege separation
  • Monitor for abnormal camera process behavior and crashes

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Qualcomm security bulletin; examine camera driver versions

Check Version:

adb shell getprop ro.build.fingerprint (for Android devices) or check device firmware settings

Verify Fix Applied:

Verify firmware version has been updated to post-May 2025 patches; test camera functionality

📡 Detection & Monitoring

Log Indicators:

  • Camera service crashes
  • Memory corruption errors in camera-related logs
  • Abnormal camera process termination

Network Indicators:

  • Unusual camera activation patterns
  • Suspicious app requesting camera permissions

SIEM Query:

source="camera" AND (event="crash" OR event="memory_error")

🔗 References

📤 Share & Export