CVE-2024-49838

8.2 HIGH

📋 TL;DR

This vulnerability allows attackers to read sensitive memory contents when parsing malformed OCI (Oracle Call Interface) information elements with invalid length fields. It affects systems using Qualcomm components that process OCI data, potentially exposing cryptographic keys, credentials, or other sensitive information. The impact is limited to systems with Qualcomm chipsets that handle OCI parsing.

💻 Affected Systems

Products:
  • Qualcomm chipsets with OCI parsing capabilities
Versions: Specific versions not detailed in reference; affected versions are those prior to February 2025 security updates.
Operating Systems: Android, Linux-based systems using Qualcomm components
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in Qualcomm firmware/drivers; exact product list requires checking Qualcomm's advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete memory disclosure including cryptographic keys, authentication tokens, or sensitive application data leading to full system compromise.

🟠

Likely Case

Partial memory disclosure revealing some sensitive information that could be used for further attacks or data theft.

🟢

If Mitigated

No information disclosure due to proper input validation and memory isolation controls.

🌐 Internet-Facing: MEDIUM - Requires specific OCI parsing functionality exposed to untrusted inputs.
🏢 Internal Only: LOW - Typically requires local access or specific network conditions to trigger.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires crafting malformed OCI information elements and triggering parsing. No public exploits known as of reference date.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: February 2025 security updates from Qualcomm

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html

Restart Required: No

Instructions:

1. Check device manufacturer for available updates. 2. Apply Qualcomm February 2025 security patches. 3. Update device firmware through manufacturer channels.

🔧 Temporary Workarounds

Input validation enhancement

all

Implement additional validation for OCI information element length fields before parsing.

🧯 If You Can't Patch

  • Isolate affected systems from untrusted networks
  • Implement network filtering for OCI-related traffic

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Qualcomm's patched versions in February 2025 bulletin.

Check Version:

Device-specific commands vary; generally check Settings > About Phone > Build Number on Android devices.

Verify Fix Applied:

Verify firmware version includes February 2025 Qualcomm security updates.

📡 Detection & Monitoring

Log Indicators:

  • Memory access violations
  • Unexpected OCI parsing errors
  • Firmware crash logs

Network Indicators:

  • Malformed OCI packets
  • Unusual OCI traffic patterns

SIEM Query:

Search for firmware crash events or memory violation alerts related to OCI processing.

🔗 References

📤 Share & Export