CVE-2024-49834
📋 TL;DR
This vulnerability involves memory corruption during camera sensor power-up or power-down sequences on Qualcomm devices. It could allow attackers to execute arbitrary code or cause denial of service. This affects devices with Qualcomm camera hardware components.
💻 Affected Systems
- Qualcomm camera sensor components
📦 What is this software?
Flight Rb5 5g Platform Firmware by Qualcomm
Snapdragon 4 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Firmware →
Snapdragon 4 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 2 Mobile Firmware →
Snapdragon 480 5g Mobile Firmware by Qualcomm
Snapdragon 480 5g Mobile Firmware by Qualcomm
Snapdragon 695 5g Mobile Firmware by Qualcomm
Snapdragon 778g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Firmware →
Snapdragon 778g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Firmware →
Snapdragon 780g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 780g 5g Mobile Firmware →
Snapdragon 782g Mobile Firmware by Qualcomm
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon 8 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Firmware →
Snapdragon 8 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Firmware →
Snapdragon 8 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Firmware →
Snapdragon 8 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Firmware →
Snapdragon 8 Gen 3 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Firmware →
Snapdragon 888 5g Mobile Firmware by Qualcomm
Snapdragon 888 5g Mobile Firmware by Qualcomm
Snapdragon W5\+ Gen 1 Wearable Firmware by Qualcomm
View all CVEs affecting Snapdragon W5\+ Gen 1 Wearable Firmware →
Video Collaboration Vc1 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc1 Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete device compromise, data theft, or persistent backdoor installation.
Likely Case
Device crash or reboot causing denial of service, potentially requiring physical restart.
If Mitigated
Limited impact with proper memory protections and sandboxing in place.
🎯 Exploit Status
Exploitation requires triggering camera power sequences, likely through malicious apps with camera permissions.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Qualcomm security bulletin for specific firmware/driver updates.
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html
Restart Required: No
Instructions:
1. Check device manufacturer for security updates. 2. Apply Qualcomm-provided firmware/driver patches. 3. Update device OS if patches are included in system updates.
🔧 Temporary Workarounds
Restrict camera permissions
allLimit camera access to trusted applications only.
Disable unnecessary camera features
allTurn off camera services when not in use.
🧯 If You Can't Patch
- Isolate affected devices from critical networks
- Implement strict app vetting and camera permission controls
🔍 How to Verify
Check if Vulnerable:
Check device specifications against Qualcomm's affected products list in the security bulletin.
Check Version:
Device-specific commands vary; generally check Settings > About Phone > Software Information
Verify Fix Applied:
Verify firmware/driver versions match patched versions from Qualcomm advisory.
📡 Detection & Monitoring
Log Indicators:
- Unexpected camera power state changes
- Memory access violations in camera subsystem logs
- Device crashes during camera operations
Network Indicators:
- Unusual camera-related network traffic if exploited for data exfiltration
SIEM Query:
Search for camera service crashes or memory corruption events in system logs