CVE-2024-49838
📋 TL;DR
This vulnerability allows attackers to read sensitive memory contents when parsing malformed OCI (Oracle Call Interface) information elements with invalid length fields. It affects systems using Qualcomm components that process OCI data, potentially exposing cryptographic keys, credentials, or other sensitive information. The impact is limited to systems with Qualcomm chipsets that handle OCI parsing.
💻 Affected Systems
- Qualcomm chipsets with OCI parsing capabilities
📦 What is this software?
Snapdragon 4 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Firmware →
Snapdragon 4 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 2 Mobile Firmware →
Snapdragon 480 5g Mobile Firmware by Qualcomm
Snapdragon 480 5g Mobile Firmware by Qualcomm
Snapdragon 680 4g Mobile Firmware by Qualcomm
Snapdragon 685 4g Mobile Firmware by Qualcomm
Snapdragon 695 5g Mobile Firmware by Qualcomm
Snapdragon 8 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Firmware →
Snapdragon 8 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Firmware →
Snapdragon 8 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Firmware →
Snapdragon 8 Gen 2 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Firmware →
Snapdragon 8 Gen 3 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Firmware →
Snapdragon 865 5g Mobile Firmware by Qualcomm
Snapdragon 865 5g Mobile Firmware by Qualcomm
Snapdragon 870 5g Mobile Firmware by Qualcomm
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon W5\+ Gen 1 Wearable Firmware by Qualcomm
View all CVEs affecting Snapdragon W5\+ Gen 1 Wearable Firmware →
Snapdragon X35 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X35 5g Modem Rf Firmware →
Snapdragon X55 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf Firmware →
Snapdragon X62 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X62 5g Modem Rf Firmware →
Snapdragon X65 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf Firmware →
Snapdragon X72 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X72 5g Modem Rf Firmware →
Snapdragon X75 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf Firmware →
Snapdragon Xr2\+ Gen 1 Firmware by Qualcomm
Video Collaboration Vc1 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc1 Platform Firmware →
Video Collaboration Vc3 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc3 Platform Firmware →
Video Collaboration Vc5 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc5 Platform Firmware →
Vision Intelligence 400 Firmware by Qualcomm
⚠️ Risk & Real-World Impact
Worst Case
Complete memory disclosure including cryptographic keys, authentication tokens, or sensitive application data leading to full system compromise.
Likely Case
Partial memory disclosure revealing some sensitive information that could be used for further attacks or data theft.
If Mitigated
No information disclosure due to proper input validation and memory isolation controls.
🎯 Exploit Status
Exploitation requires crafting malformed OCI information elements and triggering parsing. No public exploits known as of reference date.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: February 2025 security updates from Qualcomm
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html
Restart Required: No
Instructions:
1. Check device manufacturer for available updates. 2. Apply Qualcomm February 2025 security patches. 3. Update device firmware through manufacturer channels.
🔧 Temporary Workarounds
Input validation enhancement
allImplement additional validation for OCI information element length fields before parsing.
🧯 If You Can't Patch
- Isolate affected systems from untrusted networks
- Implement network filtering for OCI-related traffic
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against Qualcomm's patched versions in February 2025 bulletin.
Check Version:
Device-specific commands vary; generally check Settings > About Phone > Build Number on Android devices.
Verify Fix Applied:
Verify firmware version includes February 2025 Qualcomm security updates.
📡 Detection & Monitoring
Log Indicators:
- Memory access violations
- Unexpected OCI parsing errors
- Firmware crash logs
Network Indicators:
- Malformed OCI packets
- Unusual OCI traffic patterns
SIEM Query:
Search for firmware crash events or memory violation alerts related to OCI processing.