#VU107095 Use of Out-of-range Pointer Offset in Qualcomm products - CVE-2024-45557


Vulnerability identifier: #VU107095

Vulnerability risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45557

CWE-ID: CWE-823

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
AR8035
Mobile applications / Mobile firmware & hardware
FastConnect 6700
Mobile applications / Mobile firmware & hardware
FastConnect 6900
Mobile applications / Mobile firmware & hardware
FastConnect 7800
Mobile applications / Mobile firmware & hardware
QCA6584AU
Mobile applications / Mobile firmware & hardware
QCA6698AQ
Mobile applications / Mobile firmware & hardware
QCA8081
Mobile applications / Mobile firmware & hardware
QCA8337
Mobile applications / Mobile firmware & hardware
QCC710
Mobile applications / Mobile firmware & hardware
QCM4490
Mobile applications / Mobile firmware & hardware
QCN6224
Mobile applications / Mobile firmware & hardware
QCN6274
Mobile applications / Mobile firmware & hardware
QCS4490
Mobile applications / Mobile firmware & hardware
QDU1000
Mobile applications / Mobile firmware & hardware
QDU1010
Mobile applications / Mobile firmware & hardware
QDU1110
Mobile applications / Mobile firmware & hardware
QDU1210
Mobile applications / Mobile firmware & hardware
QDX1010
Mobile applications / Mobile firmware & hardware
QDX1011
Mobile applications / Mobile firmware & hardware
QEP8111
Mobile applications / Mobile firmware & hardware
QFW7114
Mobile applications / Mobile firmware & hardware
QFW7124
Mobile applications / Mobile firmware & hardware
QRU1032
Mobile applications / Mobile firmware & hardware
QRU1052
Mobile applications / Mobile firmware & hardware
QRU1062
Mobile applications / Mobile firmware & hardware
SC8380XP
Mobile applications / Mobile firmware & hardware
SD 8 Gen1 5G
Mobile applications / Mobile firmware & hardware
SM8635
Mobile applications / Mobile firmware & hardware
Snapdragon 4 Gen 2 Mobile Platform
Mobile applications / Mobile firmware & hardware
Snapdragon 8 Gen 1 Mobile Platform
Mobile applications / Mobile firmware & hardware
Snapdragon 8 Gen 3 Mobile Platform
Mobile applications / Mobile firmware & hardware
Snapdragon 8+ Gen 1 Mobile Platform
Mobile applications / Mobile firmware & hardware
Snapdragon AR2 Gen 1 Platform
Mobile applications / Mobile firmware & hardware
Snapdragon Auto 5G Modem-RF Gen 2
Mobile applications / Mobile firmware & hardware
Snapdragon X35 5G Modem-RF System
Mobile applications / Mobile firmware & hardware
Snapdragon X72 5G Modem-RF System
Mobile applications / Mobile firmware & hardware
Snapdragon X75 5G Modem-RF System
Mobile applications / Mobile firmware & hardware
SSG2115P
Mobile applications / Mobile firmware & hardware
SSG2125P
Mobile applications / Mobile firmware & hardware
SXR1230P
Mobile applications / Mobile firmware & hardware
SXR2230P
Mobile applications / Mobile firmware & hardware
TalynPlus
Mobile applications / Mobile firmware & hardware
WCD9340
Mobile applications / Mobile firmware & hardware
WCD9370
Mobile applications / Mobile firmware & hardware
WCD9375
Mobile applications / Mobile firmware & hardware
WCD9380
Mobile applications / Mobile firmware & hardware
WCD9385
Mobile applications / Mobile firmware & hardware
WCD9390
Mobile applications / Mobile firmware & hardware
WCD9395
Mobile applications / Mobile firmware & hardware
WCN3950
Mobile applications / Mobile firmware & hardware
WCN3988
Mobile applications / Mobile firmware & hardware
WCN6755
Mobile applications / Mobile firmware & hardware
WSA8810
Mobile applications / Mobile firmware & hardware
WSA8815
Mobile applications / Mobile firmware & hardware
WSA8830
Mobile applications / Mobile firmware & hardware
WSA8835
Mobile applications / Mobile firmware & hardware
WSA8840
Mobile applications / Mobile firmware & hardware
WSA8845
Mobile applications / Mobile firmware & hardware
WSA8845H
Mobile applications / Mobile firmware & hardware
QCA6174A
Hardware solutions / Firmware
WSA8832
Hardware solutions / Firmware

Vendor: Qualcomm

Description

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Trust Management Engine. A local application can execute arbitrary code.

Mitigation
Install security update from vendor's website.

Vulnerable software versions

AR8035: All versions

FastConnect 6700: All versions

FastConnect 6900: All versions

FastConnect 7800: All versions

QCA6174A: All versions

QCA6584AU: All versions

QCA6698AQ: All versions

QCA8081: All versions

QCA8337: All versions

QCC710: All versions

QCM4490: All versions

QCN6224: All versions

QCN6274: All versions

QCS4490: All versions

QDU1000: All versions

QDU1010: All versions

QDU1110: All versions

QDU1210: All versions

QDX1010: All versions

QDX1011: All versions

QEP8111: All versions

QFW7114: All versions

QFW7124: All versions

QRU1032: All versions

QRU1052: All versions

QRU1062: All versions

SC8380XP: All versions

SD 8 Gen1 5G: All versions

SM8635: All versions

Snapdragon 4 Gen 2 Mobile Platform: All versions

Snapdragon 8 Gen 1 Mobile Platform: All versions

Snapdragon 8 Gen 3 Mobile Platform: All versions

Snapdragon 8+ Gen 1 Mobile Platform: All versions

Snapdragon AR2 Gen 1 Platform: All versions

Snapdragon Auto 5G Modem-RF Gen 2: All versions

Snapdragon X35 5G Modem-RF System: All versions

Snapdragon X72 5G Modem-RF System: All versions

Snapdragon X75 5G Modem-RF System: All versions

SSG2115P: All versions

SSG2125P: All versions

SXR1230P: All versions

SXR2230P: All versions

TalynPlus: All versions

WCD9340: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WCD9390: All versions

WCD9395: All versions

WCN3950: All versions

WCN3988: All versions

WCN6755: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8832: All versions

WSA8835: All versions

WSA8840: All versions

WSA8845: All versions

WSA8845H: All versions


External links
https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2025-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability