CVE-2024-49835
📋 TL;DR
This CVE describes a memory corruption vulnerability in Qualcomm's secure file reading functionality. Attackers could exploit this to execute arbitrary code or cause denial of service. The vulnerability affects devices using Qualcomm chipsets with the vulnerable component.
💻 Affected Systems
- Qualcomm chipsets with secure file handling components
📦 What is this software?
Snapdragon 4 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Firmware →
Snapdragon 480 5g Mobile Firmware by Qualcomm
Snapdragon 480 5g Mobile Firmware by Qualcomm
Snapdragon 680 4g Mobile Firmware by Qualcomm
Snapdragon 685 4g Mobile Firmware by Qualcomm
Snapdragon 690 5g Mobile Firmware by Qualcomm
Snapdragon 695 5g Mobile Firmware by Qualcomm
Snapdragon 720g Mobile Firmware by Qualcomm
Snapdragon 730g Mobile Firmware by Qualcomm
Snapdragon 732g Mobile Firmware by Qualcomm
Snapdragon 750g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 750g 5g Mobile Firmware →
Snapdragon 765 5g Mobile Firmware by Qualcomm
Snapdragon 765g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 765g 5g Mobile Firmware →
Snapdragon 768g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 768g 5g Mobile Firmware →
Snapdragon 778g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Firmware →
Snapdragon 778g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 778g 5g Mobile Firmware →
Snapdragon 780g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 780g 5g Mobile Firmware →
Snapdragon 782g Mobile Firmware by Qualcomm
Snapdragon 7c\+ Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 7c\+ Gen 3 Compute Firmware →
Snapdragon 8 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Firmware →
Snapdragon 8 Gen 3 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Firmware →
Snapdragon 865 5g Mobile Firmware by Qualcomm
Snapdragon 865 5g Mobile Firmware by Qualcomm
Snapdragon 870 5g Mobile Firmware by Qualcomm
Snapdragon 888 5g Mobile Firmware by Qualcomm
Snapdragon 888 5g Mobile Firmware by Qualcomm
Snapdragon 8cx Gen 3 Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 8cx Gen 3 Compute Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon X32 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X32 5g Modem Rf Firmware →
Snapdragon X35 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X35 5g Modem Rf Firmware →
Snapdragon X50 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X50 5g Modem Rf Firmware →
Snapdragon X55 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf Firmware →
Snapdragon X62 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X62 5g Modem Rf Firmware →
Snapdragon X65 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf Firmware →
Snapdragon X72 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X72 5g Modem Rf Firmware →
Snapdragon X75 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf Firmware →
Snapdragon Xr2\+ Gen 1 Firmware by Qualcomm
Video Collaboration Vc1 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc1 Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with kernel privileges leading to complete device compromise
Likely Case
Application crash or denial of service affecting device stability
If Mitigated
Limited impact due to exploit complexity and security controls
🎯 Exploit Status
Exploitation requires local access or ability to trigger secure file operations
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Qualcomm May 2025 security bulletin for specific patched versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2025-bulletin.html
Restart Required: Yes
Instructions:
1. Check Qualcomm advisory for affected chipset versions. 2. Obtain firmware/software updates from device manufacturer. 3. Apply updates following manufacturer instructions. 4. Reboot device after update.
🔧 Temporary Workarounds
Restrict secure file access
linuxLimit which applications can access secure file operations
# Requires SELinux/AppArmor policies or application permission restrictions
🧯 If You Can't Patch
- Implement strict application sandboxing and privilege separation
- Monitor for abnormal memory usage patterns and application crashes
🔍 How to Verify
Check if Vulnerable:
Check device chipset version and compare against Qualcomm's affected list in advisory
Check Version:
# Android: getprop ro.boot.hardware
# Linux: cat /proc/cpuinfo | grep -i qualcomm
Verify Fix Applied:
Verify firmware/software version matches patched versions in Qualcomm bulletin
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- Application crashes related to secure file operations
- Memory corruption error messages
Network Indicators:
- Unusual local process communication attempting file operations
SIEM Query:
source="kernel" AND ("panic" OR "corruption" OR "segfault") AND process="*secure*"