CVE-2024-45573

7.8 HIGH

📋 TL;DR

This vulnerability allows memory corruption through negative indexing of display ID during test pattern generation. It affects systems using Qualcomm display components, potentially leading to arbitrary code execution. The vulnerability primarily impacts devices with Qualcomm chipsets including smartphones, tablets, and embedded systems.

💻 Affected Systems

Products:
  • Qualcomm display components
  • Devices with Qualcomm chipsets
Versions: Specific versions not detailed in reference; check Qualcomm February 2025 bulletin
Operating Systems: Android, Linux-based systems using Qualcomm display drivers
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in display subsystem; exploitation requires triggering test pattern generation with malicious parameters

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or persistent backdoor installation

🟠

Likely Case

Application crash or denial of service, potentially allowing privilege escalation in multi-user environments

🟢

If Mitigated

Contained crash with no privilege escalation if proper memory protections and sandboxing are implemented

🌐 Internet-Facing: MEDIUM - Requires specific conditions to be remotely exploitable but could be chained with other vulnerabilities
🏢 Internal Only: HIGH - Local attackers or malicious applications could exploit this for privilege escalation

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires control over display ID parameter and ability to trigger test pattern generation; likely requires local access or compromised application

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm February 2025 security bulletin for specific patched versions

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html

Restart Required: No

Instructions:

1. Check Qualcomm advisory for affected chipset versions. 2. Obtain updated display driver/firmware from device manufacturer. 3. Apply patch following manufacturer's instructions. 4. Verify patch installation.

🔧 Temporary Workarounds

Disable test pattern generation

all

Prevent triggering of vulnerable test pattern generation functionality

Specific commands depend on device/OS; consult manufacturer documentation

Restrict display subsystem access

Linux-based

Limit which applications can access display control functions

Use SELinux/AppArmor policies to restrict display subsystem access

🧯 If You Can't Patch

  • Implement strict application sandboxing to limit impact of potential exploitation
  • Monitor for abnormal display subsystem activity and application crashes

🔍 How to Verify

Check if Vulnerable:

Check device chipset version and compare against Qualcomm's affected list in February 2025 bulletin

Check Version:

adb shell getprop ro.boot.hardware (for Android devices) or check /sys/class/graphics/fb0/device/version

Verify Fix Applied:

Verify display driver/firmware version matches patched version from manufacturer

📡 Detection & Monitoring

Log Indicators:

  • Unexpected display subsystem crashes
  • Applications with display permissions crashing abnormally
  • Kernel panic messages related to display driver

Network Indicators:

  • Unusual outbound connections from display-related processes

SIEM Query:

source="kernel" AND ("display" OR "fb" OR "graphics") AND ("panic" OR "segfault" OR "corruption")

🔗 References

📤 Share & Export