CVE-2024-49833

7.8 HIGH

📋 TL;DR

This vulnerability allows memory corruption in Qualcomm camera components when an invalid CID (Camera ID) is used. Attackers could potentially execute arbitrary code or cause denial of service. This affects devices using Qualcomm chipsets with vulnerable camera drivers.

💻 Affected Systems

Products:
  • Qualcomm chipsets with camera components
Versions: Specific versions not detailed in reference; check Qualcomm advisory for exact affected versions
Operating Systems: Android and other OS using Qualcomm camera drivers
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with Qualcomm camera hardware and vulnerable driver implementations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, data theft, or persistent malware installation.

🟠

Likely Case

Local privilege escalation allowing attackers to gain elevated permissions on the device.

🟢

If Mitigated

Denial of service causing camera functionality disruption without system compromise.

🌐 Internet-Facing: LOW - Requires local access or malicious app installation.
🏢 Internal Only: MEDIUM - Could be exploited by malicious apps or local attackers on compromised devices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to send malformed camera commands, likely through local app or system access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Qualcomm February 2025 security bulletin for specific patched versions

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html

Restart Required: No

Instructions:

1. Check device manufacturer for security updates. 2. Apply Qualcomm-provided patches through OEM updates. 3. Update camera driver/firmware if available separately.

🔧 Temporary Workarounds

Camera Access Restriction

all

Restrict camera permissions to trusted apps only

🧯 If You Can't Patch

  • Implement strict app vetting and permission controls
  • Monitor for suspicious camera access patterns

🔍 How to Verify

Check if Vulnerable:

Check device chipset and firmware version against Qualcomm advisory

Check Version:

adb shell getprop ro.build.version.security_patch (for Android devices)

Verify Fix Applied:

Verify security patch level includes February 2025 or later Qualcomm updates

📡 Detection & Monitoring

Log Indicators:

  • Camera service crashes
  • Unexpected camera permission requests
  • Memory corruption errors in system logs

SIEM Query:

Look for camera service anomalies or permission escalation attempts

🔗 References

📤 Share & Export