CVE-2024-49845
📋 TL;DR
This vulnerability involves memory corruption during the FRS UDS generation process in Qualcomm components, potentially allowing attackers to execute arbitrary code or cause denial of service. It affects devices using vulnerable Qualcomm chipsets, primarily mobile devices and IoT products.
💻 Affected Systems
- Qualcomm chipsets with FRS UDS functionality
📦 What is this software?
Snapdragon 765 5g Mobile Firmware by Qualcomm
Snapdragon 765g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 765g 5g Mobile Firmware →
Snapdragon 768g 5g Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 768g 5g Mobile Firmware →
Snapdragon 8 Gen 1 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 1 Mobile Firmware →
Snapdragon 8 Gen 3 Mobile Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Firmware →
Snapdragon 865 5g Mobile Firmware by Qualcomm
Snapdragon 865 5g Mobile Firmware by Qualcomm
Snapdragon 870 5g Mobile Firmware by Qualcomm
Snapdragon 888 5g Mobile Firmware by Qualcomm
Snapdragon 888 5g Mobile Firmware by Qualcomm
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon X32 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X32 5g Modem Rf Firmware →
Snapdragon X35 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X35 5g Modem Rf Firmware →
Snapdragon X55 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X55 5g Modem Rf Firmware →
Snapdragon X62 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X62 5g Modem Rf Firmware →
Snapdragon X65 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X65 5g Modem Rf Firmware →
Snapdragon X72 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X72 5g Modem Rf Firmware →
Snapdragon X75 5g Modem Rf Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with kernel privileges leading to complete device compromise, data theft, or persistent backdoor installation.
Likely Case
Local privilege escalation or denial of service affecting device stability and availability.
If Mitigated
Limited impact with proper memory protections and exploit mitigations in place.
🎯 Exploit Status
Exploitation likely requires local access or specific conditions; memory corruption vulnerabilities can be leveraged for privilege escalation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm security bulletin for specific firmware versions
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2025-bulletin.html
Restart Required: Yes
Instructions:
1. Check Qualcomm advisory for affected chipset models. 2. Obtain updated firmware from device manufacturer. 3. Apply firmware update following manufacturer instructions. 4. Reboot device to activate patch.
🔧 Temporary Workarounds
Restrict local access
allLimit physical and network access to vulnerable devices to reduce attack surface.
🧯 If You Can't Patch
- Isolate affected devices on segmented networks with strict access controls.
- Implement application allowlisting and memory protection mechanisms where supported.
🔍 How to Verify
Check if Vulnerable:
Check device chipset model and firmware version against Qualcomm advisory; use 'cat /proc/cpuinfo' on Linux systems to identify Qualcomm chips.
Check Version:
Check manufacturer-specific commands for firmware version (e.g., 'getprop ro.build.version.incremental' on Android).
Verify Fix Applied:
Verify firmware version has been updated to patched release specified in Qualcomm bulletin.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs, memory corruption errors in system logs, unexpected process crashes
Network Indicators:
- Unusual local network traffic to/from affected devices
SIEM Query:
Search for events related to kernel crashes or privilege escalation attempts on devices with Qualcomm chipsets.