CVE-2024-49842
📋 TL;DR
This CVE describes a memory corruption vulnerability in Qualcomm components where incorrect API restrictions allow memory mapping into protected VM address space. Attackers could exploit this to execute arbitrary code or cause denial of service. This affects devices using vulnerable Qualcomm chipsets, primarily Android smartphones and IoT devices.
💻 Affected Systems
- Qualcomm chipsets with vulnerable components
- Android devices using affected Qualcomm chips
📦 What is this software?
Snapdragon 765 5g Mobile Firmware by Qualcomm
Snapdragon 765g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 765g 5g Mobile Firmware →
Snapdragon 768g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 768g 5g Mobile Firmware →
Snapdragon 8 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Firmware →
Snapdragon 8 Gen 3 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Firmware →
Snapdragon 850 Mobile Compute Firmware by Qualcomm
View all CVEs affecting Snapdragon 850 Mobile Compute Firmware →
Snapdragon 865 5g Mobile Firmware by Qualcomm
Snapdragon 865 5g Mobile Firmware by Qualcomm
Snapdragon 870 5g Mobile Firmware by Qualcomm
Snapdragon 888 5g Mobile Firmware by Qualcomm
Snapdragon 888 5g Mobile Firmware by Qualcomm
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon Wear 4100\+ Firmware by Qualcomm
Snapdragon X24 Lte Modem Firmware by Qualcomm
Snapdragon X32 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X32 5g Modem Rf Firmware →
Snapdragon X35 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X35 5g Modem Rf Firmware →
Snapdragon X50 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X50 5g Modem Rf Firmware →
Snapdragon X55 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf Firmware →
Snapdragon X62 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X62 5g Modem Rf Firmware →
Snapdragon X65 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf Firmware →
Snapdragon X72 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X72 5g Modem Rf Firmware →
Snapdragon X75 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf Firmware →
Video Collaboration Vc3 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc3 Platform Firmware →
Vision Intelligence 300 Firmware by Qualcomm
Vision Intelligence 400 Firmware by Qualcomm
⚠️ Risk & Real-World Impact
Worst Case
Full device compromise with kernel-level code execution, allowing complete control over affected device including data theft, persistence, and lateral movement.
Likely Case
Local privilege escalation allowing attackers to gain elevated privileges on already compromised devices or through malicious apps.
If Mitigated
Limited impact with proper app sandboxing and SELinux policies in place, potentially only denial of service.
🎯 Exploit Status
Requires local access or malicious app; memory corruption vulnerabilities often require specific conditions to exploit reliably
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Qualcomm May 2025 security bulletin for specific patched versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2025-bulletin.html
Restart Required: Yes
Instructions:
1. Check Qualcomm advisory for affected chipset versions. 2. Contact device manufacturer for firmware updates. 3. Apply manufacturer-provided security patches. 4. Reboot device after update.
🔧 Temporary Workarounds
Restrict app permissions
androidLimit app access to sensitive permissions that could be used to trigger the vulnerability
Enable SELinux enforcing mode
linuxEnsure SELinux is in enforcing mode to limit potential damage from exploitation
getenforce
setenforce 1
🧯 If You Can't Patch
- Isolate affected devices from critical networks and sensitive data
- Implement application allowlisting to prevent unauthorized app execution
🔍 How to Verify
Check if Vulnerable:
Check device chipset version and compare against Qualcomm advisory; use 'getprop ro.boot.hardware' on Android devices to identify chipset
Check Version:
Android: 'getprop ro.build.version.security_patch' or 'getprop ro.boot.hardware'
Verify Fix Applied:
Verify security patch level is May 2025 or later; check with device manufacturer for specific patch verification
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- SELinux denials related to memory mapping operations
- Unexpected process crashes with memory access violations
Network Indicators:
- Not network exploitable; focus on local system behavior
SIEM Query:
Process: (kernel panic OR segmentation fault) AND Device: (Qualcomm chipset)