CVE-2024-49843
📋 TL;DR
This vulnerability allows memory corruption through improper input validation when processing IOCTL calls related to GPU AHB bus error handling. Attackers could potentially execute arbitrary code or cause denial of service on affected systems. This primarily affects devices with Qualcomm GPUs that haven't been patched.
💻 Affected Systems
- Qualcomm GPU drivers
📦 What is this software?
Snapdragon 4 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 4 Gen 1 Mobile Firmware →
Snapdragon 480 5g Mobile Firmware by Qualcomm
Snapdragon 480 5g Mobile Firmware by Qualcomm
Snapdragon 695 5g Mobile Firmware by Qualcomm
Snapdragon 8 Gen 3 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Firmware →
Snapdragon W5\+ Gen 1 Wearable Firmware by Qualcomm
View all CVEs affecting Snapdragon W5\+ Gen 1 Wearable Firmware →
Video Collaboration Vc1 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc1 Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with kernel-level code execution leading to complete device control
Likely Case
System crash or denial of service through memory corruption
If Mitigated
Limited impact with proper input validation and memory protections
🎯 Exploit Status
Requires local access or malicious app with appropriate permissions; IOCTL manipulation needed
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patches included in February 2025 security bulletin
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html
Restart Required: No
Instructions:
1. Check device manufacturer for security updates. 2. Apply February 2025 or later Qualcomm security patches. 3. Update GPU drivers if available separately.
🔧 Temporary Workarounds
Restrict IOCTL access
Linux-based systemsLimit access to GPU IOCTL interfaces through SELinux/AppArmor policies
# Configure SELinux to restrict GPU device access
# audit2allow and custom policies may be needed
🧯 If You Can't Patch
- Implement strict application sandboxing to limit GPU access
- Monitor for abnormal GPU-related system calls and memory access patterns
🔍 How to Verify
Check if Vulnerable:
Check Qualcomm security patch level - if before February 2025, likely vulnerable
Check Version:
On Android: getprop ro.build.version.security_patch
Verify Fix Applied:
Verify security patch level includes February 2025 or later Qualcomm updates
📡 Detection & Monitoring
Log Indicators:
- Unusual GPU IOCTL calls
- Memory access violations in kernel logs
- GPU driver crash reports
Network Indicators:
- Not network exploitable - local vulnerability
SIEM Query:
source="kernel" AND "GPU" AND ("IOCTL" OR "memory corruption" OR "AHB")