CVE-2024-49843

7.8 HIGH

📋 TL;DR

This vulnerability allows memory corruption through improper input validation when processing IOCTL calls related to GPU AHB bus error handling. Attackers could potentially execute arbitrary code or cause denial of service on affected systems. This primarily affects devices with Qualcomm GPUs that haven't been patched.

💻 Affected Systems

Products:
  • Qualcomm GPU drivers
Versions: Specific versions not detailed in reference, but pre-February 2025 patches
Operating Systems: Android, Linux distributions with Qualcomm GPUs
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with Qualcomm Adreno GPUs; exact chipset models not specified in provided reference

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with kernel-level code execution leading to complete device control

🟠

Likely Case

System crash or denial of service through memory corruption

🟢

If Mitigated

Limited impact with proper input validation and memory protections

🌐 Internet-Facing: LOW - Requires local access or malicious app installation
🏢 Internal Only: MEDIUM - Could be exploited by malicious apps or local users

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access or malicious app with appropriate permissions; IOCTL manipulation needed

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches included in February 2025 security bulletin

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html

Restart Required: No

Instructions:

1. Check device manufacturer for security updates. 2. Apply February 2025 or later Qualcomm security patches. 3. Update GPU drivers if available separately.

🔧 Temporary Workarounds

Restrict IOCTL access

Linux-based systems

Limit access to GPU IOCTL interfaces through SELinux/AppArmor policies

# Configure SELinux to restrict GPU device access
# audit2allow and custom policies may be needed

🧯 If You Can't Patch

  • Implement strict application sandboxing to limit GPU access
  • Monitor for abnormal GPU-related system calls and memory access patterns

🔍 How to Verify

Check if Vulnerable:

Check Qualcomm security patch level - if before February 2025, likely vulnerable

Check Version:

On Android: getprop ro.build.version.security_patch

Verify Fix Applied:

Verify security patch level includes February 2025 or later Qualcomm updates

📡 Detection & Monitoring

Log Indicators:

  • Unusual GPU IOCTL calls
  • Memory access violations in kernel logs
  • GPU driver crash reports

Network Indicators:

  • Not network exploitable - local vulnerability

SIEM Query:

source="kernel" AND "GPU" AND ("IOCTL" OR "memory corruption" OR "AHB")

🔗 References

📤 Share & Export