Multiple vulnerabilities in Qualcomm chipsets



Risk Medium
Patch available YES
Number of vulnerabilities 19
CVE-ID CVE-2024-45542
CVE-2024-45558
CVE-2024-21464
CVE-2024-45559
CVE-2024-45550
CVE-2024-45548
CVE-2024-45547
CVE-2024-45546
CVE-2024-45541
CVE-2024-45553
CVE-2024-43064
CVE-2024-43063
CVE-2024-23366
CVE-2024-33067
CVE-2024-33059
CVE-2024-33061
CVE-2024-33055
CVE-2024-33041
CVE-2024-45555
CWE-ID CWE-121
CWE-126
CWE-120
CWE-129
CWE-416
CWE-264
CWE-823
CWE-787
Exploitation vector Network
Public exploit N/A
Vulnerable software
AQT1000
Mobile applications / Mobile firmware & hardware

FastConnect 6200
Mobile applications / Mobile firmware & hardware

FastConnect 6700
Mobile applications / Mobile firmware & hardware

FastConnect 6800
Mobile applications / Mobile firmware & hardware

FastConnect 6900
Mobile applications / Mobile firmware & hardware

FastConnect 7800
Mobile applications / Mobile firmware & hardware

QCA1062
Mobile applications / Mobile firmware & hardware

QCA1064
Mobile applications / Mobile firmware & hardware

QCA2062
Mobile applications / Mobile firmware & hardware

QCA2064
Mobile applications / Mobile firmware & hardware

QCA2065
Mobile applications / Mobile firmware & hardware

QCA2066
Mobile applications / Mobile firmware & hardware

QCA6391
Mobile applications / Mobile firmware & hardware

QCA6420
Mobile applications / Mobile firmware & hardware

QCA6430
Mobile applications / Mobile firmware & hardware

QCA6595AU
Mobile applications / Mobile firmware & hardware

QCC2073
Mobile applications / Mobile firmware & hardware

QCC2076
Mobile applications / Mobile firmware & hardware

QCM5430
Mobile applications / Mobile firmware & hardware

QCM6490
Mobile applications / Mobile firmware & hardware

QCN7606
Mobile applications / Mobile firmware & hardware

QCS5430
Mobile applications / Mobile firmware & hardware

QCS6490
Mobile applications / Mobile firmware & hardware

Qualcomm Video Collaboration VC3 Platform
Mobile applications / Mobile firmware & hardware

SC8180X+SDX55
Mobile applications / Mobile firmware & hardware

SC8380XP
Mobile applications / Mobile firmware & hardware

SM6250
Mobile applications / Mobile firmware & hardware

Snapdragon 7c Compute Platform (SC7180-AC)
Mobile applications / Mobile firmware & hardware

Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro"
Mobile applications / Mobile firmware & hardware

Snapdragon 7c+ Gen 3 Compute
Mobile applications / Mobile firmware & hardware

Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite"
Mobile applications / Mobile firmware & hardware

Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite"
Mobile applications / Mobile firmware & hardware

Snapdragon 8cx Compute Platform (SC8180X-AA
Mobile applications / Mobile firmware & hardware

AB)
Mobile applications / Mobile firmware & hardware

Snapdragon 8cx Compute Platform (SC8180XP-AC
Mobile applications / Mobile firmware & hardware

AF) "Poipu Pro"
Mobile applications / Mobile firmware & hardware

Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC
Mobile applications / Mobile firmware & hardware

Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA
Mobile applications / Mobile firmware & hardware

Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB
Mobile applications / Mobile firmware & hardware

BB)
Mobile applications / Mobile firmware & hardware

WCD9340
Mobile applications / Mobile firmware & hardware

WCD9341
Mobile applications / Mobile firmware & hardware

WCD9370
Mobile applications / Mobile firmware & hardware

WCD9375
Mobile applications / Mobile firmware & hardware

WCD9380
Mobile applications / Mobile firmware & hardware

WCD9385
Mobile applications / Mobile firmware & hardware

WSA8810
Mobile applications / Mobile firmware & hardware

WSA8815
Mobile applications / Mobile firmware & hardware

WSA8830
Mobile applications / Mobile firmware & hardware

WSA8835
Mobile applications / Mobile firmware & hardware

WSA8840
Mobile applications / Mobile firmware & hardware

WSA8845
Mobile applications / Mobile firmware & hardware

WSA8845H
Mobile applications / Mobile firmware & hardware

AR8035
Mobile applications / Mobile firmware & hardware

CSR8811
Mobile applications / Mobile firmware & hardware

Immersive Home 214 Platform
Mobile applications / Mobile firmware & hardware

Immersive Home 216 Platform
Mobile applications / Mobile firmware & hardware

Immersive Home 316 Platform
Mobile applications / Mobile firmware & hardware

Immersive Home 318 Platform
Mobile applications / Mobile firmware & hardware

Immersive Home 3210 Platform
Mobile applications / Mobile firmware & hardware

Immersive Home 326 Platform
Mobile applications / Mobile firmware & hardware

IPQ5010
Mobile applications / Mobile firmware & hardware

IPQ5028
Mobile applications / Mobile firmware & hardware

IPQ5300
Mobile applications / Mobile firmware & hardware

IPQ5302
Mobile applications / Mobile firmware & hardware

IPQ5312
Mobile applications / Mobile firmware & hardware

IPQ5332
Mobile applications / Mobile firmware & hardware

IPQ6000
Mobile applications / Mobile firmware & hardware

IPQ6010
Mobile applications / Mobile firmware & hardware

IPQ6018
Mobile applications / Mobile firmware & hardware

IPQ6028
Mobile applications / Mobile firmware & hardware

IPQ8070A
Mobile applications / Mobile firmware & hardware

IPQ8071A
Mobile applications / Mobile firmware & hardware

IPQ8072A
Mobile applications / Mobile firmware & hardware

IPQ8074A
Mobile applications / Mobile firmware & hardware

IPQ8076
Mobile applications / Mobile firmware & hardware

IPQ8076A
Mobile applications / Mobile firmware & hardware

IPQ8078
Mobile applications / Mobile firmware & hardware

IPQ8078A
Mobile applications / Mobile firmware & hardware

IPQ8173
Mobile applications / Mobile firmware & hardware

IPQ8174
Mobile applications / Mobile firmware & hardware

IPQ9008
Mobile applications / Mobile firmware & hardware

IPQ9048
Mobile applications / Mobile firmware & hardware

IPQ9554
Mobile applications / Mobile firmware & hardware

IPQ9570
Mobile applications / Mobile firmware & hardware

IPQ9574
Mobile applications / Mobile firmware & hardware

QAM8255P
Mobile applications / Mobile firmware & hardware

QAM8295P
Mobile applications / Mobile firmware & hardware

QAM8620P
Mobile applications / Mobile firmware & hardware

QAM8650P
Mobile applications / Mobile firmware & hardware

QAM8775P
Mobile applications / Mobile firmware & hardware

QAMSRV1H
Mobile applications / Mobile firmware & hardware

QAMSRV1M
Mobile applications / Mobile firmware & hardware

QCA0000
Mobile applications / Mobile firmware & hardware

QCA4024
Mobile applications / Mobile firmware & hardware

QCA6554A
Mobile applications / Mobile firmware & hardware

QCA6564AU
Mobile applications / Mobile firmware & hardware

QCA6574
Mobile applications / Mobile firmware & hardware

QCA6574A
Mobile applications / Mobile firmware & hardware

QCA6584AU
Mobile applications / Mobile firmware & hardware

QCA6595
Mobile applications / Mobile firmware & hardware

QCA6678AQ
Mobile applications / Mobile firmware & hardware

QCA6688AQ
Mobile applications / Mobile firmware & hardware

QCA6696
Mobile applications / Mobile firmware & hardware

QCA6698AQ
Mobile applications / Mobile firmware & hardware

QCA6777AQ
Mobile applications / Mobile firmware & hardware

QCA6787AQ
Mobile applications / Mobile firmware & hardware

QCA6797AQ
Mobile applications / Mobile firmware & hardware

QCA8075
Mobile applications / Mobile firmware & hardware

QCA8081
Mobile applications / Mobile firmware & hardware

QCA8082
Mobile applications / Mobile firmware & hardware

QCA8084
Mobile applications / Mobile firmware & hardware

QCA8085
Mobile applications / Mobile firmware & hardware

QCA8337
Mobile applications / Mobile firmware & hardware

QCA8386
Mobile applications / Mobile firmware & hardware

QCA9888
Mobile applications / Mobile firmware & hardware

QCA9889
Mobile applications / Mobile firmware & hardware

QCC710
Mobile applications / Mobile firmware & hardware

QCF8000
Mobile applications / Mobile firmware & hardware

QCF8000SFP
Mobile applications / Mobile firmware & hardware

QCF8001
Mobile applications / Mobile firmware & hardware

QCM8550
Mobile applications / Mobile firmware & hardware

QCN5022
Mobile applications / Mobile firmware & hardware

QCN5024
Mobile applications / Mobile firmware & hardware

QCN5052
Mobile applications / Mobile firmware & hardware

QCN5122
Mobile applications / Mobile firmware & hardware

QCN5124
Mobile applications / Mobile firmware & hardware

QCN5152
Mobile applications / Mobile firmware & hardware

QCN5154
Mobile applications / Mobile firmware & hardware

QCN5164
Mobile applications / Mobile firmware & hardware

QCN6023
Mobile applications / Mobile firmware & hardware

QCN6024
Mobile applications / Mobile firmware & hardware

QCN6112
Mobile applications / Mobile firmware & hardware

QCN6122
Mobile applications / Mobile firmware & hardware

QCN6224
Mobile applications / Mobile firmware & hardware

QCN6274
Mobile applications / Mobile firmware & hardware

QCN6402
Mobile applications / Mobile firmware & hardware

QCN6412
Mobile applications / Mobile firmware & hardware

QCN6422
Mobile applications / Mobile firmware & hardware

QCN6432
Mobile applications / Mobile firmware & hardware

QCN9000
Mobile applications / Mobile firmware & hardware

QCN9012
Mobile applications / Mobile firmware & hardware

QCN9022
Mobile applications / Mobile firmware & hardware

QCN9024
Mobile applications / Mobile firmware & hardware

QCN9070
Mobile applications / Mobile firmware & hardware

QCN9072
Mobile applications / Mobile firmware & hardware

QCN9074
Mobile applications / Mobile firmware & hardware

QCN9100
Mobile applications / Mobile firmware & hardware

QCN9160
Mobile applications / Mobile firmware & hardware

QCN9274
Mobile applications / Mobile firmware & hardware

QCS410
Mobile applications / Mobile firmware & hardware

QCS610
Mobile applications / Mobile firmware & hardware

QCS8550
Mobile applications / Mobile firmware & hardware

QCS9100
Mobile applications / Mobile firmware & hardware

QFW7114
Mobile applications / Mobile firmware & hardware

QFW7124
Mobile applications / Mobile firmware & hardware

Qualcomm Video Collaboration VC1 Platform
Mobile applications / Mobile firmware & hardware

QXM8083
Mobile applications / Mobile firmware & hardware

SA7255P
Mobile applications / Mobile firmware & hardware

SA7775P
Mobile applications / Mobile firmware & hardware

SA8155P
Mobile applications / Mobile firmware & hardware

SA8195P
Mobile applications / Mobile firmware & hardware

SA8255P
Mobile applications / Mobile firmware & hardware

SA8295P
Mobile applications / Mobile firmware & hardware

SA8530P
Mobile applications / Mobile firmware & hardware

SA8650P
Mobile applications / Mobile firmware & hardware

SA8770P
Mobile applications / Mobile firmware & hardware

SA8775P
Mobile applications / Mobile firmware & hardware

SDX65M
Mobile applications / Mobile firmware & hardware

SM6650
Mobile applications / Mobile firmware & hardware

SM7635
Mobile applications / Mobile firmware & hardware

SM7675
Mobile applications / Mobile firmware & hardware

SM7675P
Mobile applications / Mobile firmware & hardware

SM8550P
Mobile applications / Mobile firmware & hardware

SM8635
Mobile applications / Mobile firmware & hardware

SM8635P
Mobile applications / Mobile firmware & hardware

SM8750
Mobile applications / Mobile firmware & hardware

SM8750P
Mobile applications / Mobile firmware & hardware

Snapdragon 8 Gen 2 Mobile Platform
Mobile applications / Mobile firmware & hardware

Snapdragon 8 Gen 3 Mobile Platform
Mobile applications / Mobile firmware & hardware

Snapdragon 8+ Gen 2 Mobile Platform
Mobile applications / Mobile firmware & hardware

Snapdragon Auto 5G Modem-RF Gen 2
Mobile applications / Mobile firmware & hardware

Snapdragon X65 5G Modem-RF System
Mobile applications / Mobile firmware & hardware

Snapdragon X72 5G Modem-RF System
Mobile applications / Mobile firmware & hardware

Snapdragon X75 5G Modem-RF System
Mobile applications / Mobile firmware & hardware

SRV1H
Mobile applications / Mobile firmware & hardware

SRV1L
Mobile applications / Mobile firmware & hardware

SRV1M
Mobile applications / Mobile firmware & hardware

SXR2230P
Mobile applications / Mobile firmware & hardware

SXR2250P
Mobile applications / Mobile firmware & hardware

SXR2330P
Mobile applications / Mobile firmware & hardware

WCD9378
Mobile applications / Mobile firmware & hardware

WCD9390
Mobile applications / Mobile firmware & hardware

WCD9395
Mobile applications / Mobile firmware & hardware

WCN3950
Mobile applications / Mobile firmware & hardware

WCN3980
Mobile applications / Mobile firmware & hardware

WCN3988
Mobile applications / Mobile firmware & hardware

WCN6450
Mobile applications / Mobile firmware & hardware

WCN6650
Mobile applications / Mobile firmware & hardware

WCN6755
Mobile applications / Mobile firmware & hardware

WCN7860
Mobile applications / Mobile firmware & hardware

WCN7861
Mobile applications / Mobile firmware & hardware

WCN7880
Mobile applications / Mobile firmware & hardware

WCN7881
Mobile applications / Mobile firmware & hardware

QCM4490
Mobile applications / Mobile firmware & hardware

QCS4490
Mobile applications / Mobile firmware & hardware

Snapdragon 8+ Gen 1 Mobile Platform
Mobile applications / Mobile firmware & hardware

TalynPlus
Mobile applications / Mobile firmware & hardware

WCN6740
Mobile applications / Mobile firmware & hardware

Flight RB5 5G Platform
Mobile applications / Mobile firmware & hardware

QCM4325
Mobile applications / Mobile firmware & hardware

QCS7230
Mobile applications / Mobile firmware & hardware

QCS8250
Mobile applications / Mobile firmware & hardware

QDU1000
Mobile applications / Mobile firmware & hardware

QDU1010
Mobile applications / Mobile firmware & hardware

QDU1110
Mobile applications / Mobile firmware & hardware

QDU1210
Mobile applications / Mobile firmware & hardware

QDX1010
Mobile applications / Mobile firmware & hardware

QDX1011
Mobile applications / Mobile firmware & hardware

QEP8111
Mobile applications / Mobile firmware & hardware

QRB5165N
Mobile applications / Mobile firmware & hardware

QRU1032
Mobile applications / Mobile firmware & hardware

QRU1052
Mobile applications / Mobile firmware & hardware

QRU1062
Mobile applications / Mobile firmware & hardware

Qualcomm Video Collaboration VC5 Platform
Mobile applications / Mobile firmware & hardware

Robotics RB5 Platform
Mobile applications / Mobile firmware & hardware

SD 8 Gen1 5G
Mobile applications / Mobile firmware & hardware

SG4150P
Mobile applications / Mobile firmware & hardware

SM4635
Mobile applications / Mobile firmware & hardware

Snapdragon 4 Gen 1 Mobile Platform
Mobile applications / Mobile firmware & hardware

Snapdragon 4 Gen 2 Mobile Platform
Mobile applications / Mobile firmware & hardware

Snapdragon 460 Mobile Platform
Mobile applications / Mobile firmware & hardware

Snapdragon 480 5G Mobile Platform
Mobile applications / Mobile firmware & hardware

Snapdragon 480+ 5G Mobile Platform (SM4350-AC)
Mobile applications / Mobile firmware & hardware

Snapdragon 662 Mobile Platform
Mobile applications / Mobile firmware & hardware

Snapdragon 680 4G Mobile Platform
Mobile applications / Mobile firmware & hardware

Snapdragon 685 4G Mobile Platform (SM6225-AD)
Mobile applications / Mobile firmware & hardware

Snapdragon 695 5G Mobile Platform
Mobile applications / Mobile firmware & hardware

Snapdragon 8 Gen 1 Mobile Platform
Mobile applications / Mobile firmware & hardware

Snapdragon AR1 Gen 1 Platform
Mobile applications / Mobile firmware & hardware

Snapdragon AR1 Gen 1 Platform "Luna1"
Mobile applications / Mobile firmware & hardware

Snapdragon AR2 Gen 1 Platform
Mobile applications / Mobile firmware & hardware

Snapdragon W5+ Gen 1 Wearable Platform
Mobile applications / Mobile firmware & hardware

Snapdragon X35 5G Modem-RF System
Mobile applications / Mobile firmware & hardware

SSG2115P
Mobile applications / Mobile firmware & hardware

SSG2125P
Mobile applications / Mobile firmware & hardware

SW5100
Mobile applications / Mobile firmware & hardware

SW5100P
Mobile applications / Mobile firmware & hardware

SXR1230P
Mobile applications / Mobile firmware & hardware

Snapdragon 429 Mobile Platform
Mobile applications / Mobile firmware & hardware

WCN3620
Mobile applications / Mobile firmware & hardware

WCN3660B
Mobile applications / Mobile firmware & hardware

C-V2X 9150
Mobile applications / Mobile firmware & hardware

CSRB31024
Mobile applications / Mobile firmware & hardware

QCA6310
Mobile applications / Mobile firmware & hardware

QCA6320
Mobile applications / Mobile firmware & hardware

QCA6426
Mobile applications / Mobile firmware & hardware

QCA6436
Mobile applications / Mobile firmware & hardware

QCA6564A
Mobile applications / Mobile firmware & hardware

QCA9367
Mobile applications / Mobile firmware & hardware

QSM8250
Mobile applications / Mobile firmware & hardware

SA6145P
Mobile applications / Mobile firmware & hardware

SA6150P
Mobile applications / Mobile firmware & hardware

SA8145P
Mobile applications / Mobile firmware & hardware

SA8150P
Mobile applications / Mobile firmware & hardware

SD865 5G
Mobile applications / Mobile firmware & hardware

Snapdragon 820 Automotive Platform
Mobile applications / Mobile firmware & hardware

Snapdragon 835 Mobile PC Platform
Mobile applications / Mobile firmware & hardware

Snapdragon 865 5G Mobile Platform
Mobile applications / Mobile firmware & hardware

Snapdragon 865+ 5G Mobile Platform (SM8250-AB)
Mobile applications / Mobile firmware & hardware

Snapdragon 870 5G Mobile Platform (SM8250-AC)
Mobile applications / Mobile firmware & hardware

Snapdragon X55 5G Modem-RF System
Mobile applications / Mobile firmware & hardware

Snapdragon XR2 5G Platform
Mobile applications / Mobile firmware & hardware

Snapdragon Auto 4G Modem
Mobile applications / Mobile firmware & hardware

WCD9335
Mobile applications / Mobile firmware & hardware

WCN3680B
Mobile applications / Mobile firmware & hardware

WCN3990
Mobile applications / Mobile firmware & hardware

SG8275P
Mobile applications / Mobile firmware & hardware

SA6155
Mobile applications / Mobile firmware & hardware

SA8155
Mobile applications / Mobile firmware & hardware

QCN7605
Hardware solutions / Firmware

QCA6574AU
Hardware solutions / Firmware

QCN6132
Hardware solutions / Firmware

SA6155P
Hardware solutions / Firmware

SA8540P
Hardware solutions / Firmware

SA8620P
Hardware solutions / Firmware

SA9000P
Hardware solutions / Firmware

SDX55
Hardware solutions / Firmware

WSA8832
Hardware solutions / Firmware

QCA6174A
Hardware solutions / Firmware

SDM429W
Hardware solutions / Firmware

MSM8996AU
Hardware solutions / Firmware

QCA9377
Hardware solutions / Firmware

SD835
Hardware solutions / Firmware

SXR2130
Hardware solutions / Firmware

Vendor Qualcomm

Security Bulletin

This security bulletin contains information about 19 vulnerabilities.

1) Stack-based buffer overflow

EUVDB-ID: #VU102322

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45542

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in WLAN Windows Host. A local application can execute arbitrary code.

Mitigation

Install security update from vendor's website.

Vulnerable software versions

AQT1000: All versions

FastConnect 6200: All versions

FastConnect 6700: All versions

FastConnect 6800: All versions

FastConnect 6900: All versions

FastConnect 7800: All versions

QCA1062: All versions

QCA1064: All versions

QCA2062: All versions

QCA2064: All versions

QCA2065: All versions

QCA2066: All versions

QCA6391: All versions

QCA6420: All versions

QCA6430: All versions

QCA6595AU: All versions

QCC2073: All versions

QCC2076: All versions

QCM5430: All versions

QCM6490: All versions

QCN7605: All versions

QCN7606: All versions

QCS5430: All versions

QCS6490: All versions

Qualcomm Video Collaboration VC3 Platform: All versions

SC8180X+SDX55: All versions

SC8380XP: All versions

SM6250: All versions

Snapdragon 7c Compute Platform (SC7180-AC): All versions

Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro": All versions

Snapdragon 7c+ Gen 3 Compute: All versions

Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite": All versions

Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite": All versions

Snapdragon 8cx Compute Platform (SC8180X-AA: All versions

AB): All versions

Snapdragon 8cx Compute Platform (SC8180XP-AC: All versions

AF) "Poipu Pro": All versions

Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC: All versions

Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA: All versions

Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB: All versions

BB): All versions

WCD9340: All versions

WCD9341: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

WSA8840: All versions

WSA8845: All versions

WSA8845H: All versions

CPE2.3 External links

https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Buffer over-read

EUVDB-ID: #VU102331

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2024-45558

CWE-ID: CWE-126 - Buffer over-read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Host Cmn. A remote attacker can perform a denial of service (DoS) attack.

Mitigation

Install security update from vendor's website.

Vulnerable software versions

AR8035: All versions

CSR8811: All versions

FastConnect 6700: All versions

FastConnect 6900: All versions

FastConnect 7800: All versions

Immersive Home 214 Platform: All versions

Immersive Home 216 Platform: All versions

Immersive Home 316 Platform: All versions

Immersive Home 318 Platform: All versions

Immersive Home 3210 Platform: All versions

Immersive Home 326 Platform: All versions

IPQ5010: All versions

IPQ5028: All versions

IPQ5300: All versions

IPQ5302: All versions

IPQ5312: All versions

IPQ5332: All versions

IPQ6000: All versions

IPQ6010: All versions

IPQ6018: All versions

IPQ6028: All versions

IPQ8070A: All versions

IPQ8071A: All versions

IPQ8072A: All versions

IPQ8074A: All versions

IPQ8076: All versions

IPQ8076A: All versions

IPQ8078: All versions

IPQ8078A: All versions

IPQ8173: All versions

IPQ8174: All versions

IPQ9008: All versions

IPQ9048: All versions

IPQ9554: All versions

IPQ9570: All versions

IPQ9574: All versions

QAM8255P: All versions

QAM8295P: All versions

QAM8620P: All versions

QAM8650P: All versions

QAM8775P: All versions

QAMSRV1H: All versions

QAMSRV1M: All versions

QCA0000: All versions

QCA4024: All versions

QCA6554A: All versions

QCA6564AU: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6584AU: All versions

QCA6595: All versions

QCA6595AU: All versions

QCA6678AQ: All versions

QCA6688AQ: All versions

QCA6696: All versions

QCA6698AQ: All versions

QCA6777AQ: All versions

QCA6787AQ: All versions

QCA6797AQ: All versions

QCA8075: All versions

QCA8081: All versions

QCA8082: All versions

QCA8084: All versions

QCA8085: All versions

QCA8337: All versions

QCA8386: All versions

QCA9888: All versions

QCA9889: All versions

QCC2073: All versions

QCC2076: All versions

QCC710: All versions

QCF8000: All versions

QCF8000SFP: All versions

QCF8001: All versions

QCM5430: All versions

QCM6490: All versions

QCM8550: All versions

QCN5022: All versions

QCN5024: All versions

QCN5052: All versions

QCN5122: All versions

QCN5124: All versions

QCN5152: All versions

QCN5154: All versions

QCN5164: All versions

QCN6023: All versions

QCN6024: All versions

QCN6112: All versions

QCN6122: All versions

QCN6132: All versions

QCN6224: All versions

QCN6274: All versions

QCN6402: All versions

QCN6412: All versions

QCN6422: All versions

QCN6432: All versions

QCN9000: All versions

QCN9012: All versions

QCN9022: All versions

QCN9024: All versions

QCN9070: All versions

QCN9072: All versions

QCN9074: All versions

QCN9100: All versions

QCN9160: All versions

QCN9274: All versions

QCS410: All versions

QCS5430: All versions

QCS610: All versions

QCS6490: All versions

QCS8550: All versions

QCS9100: All versions

QFW7114: All versions

QFW7124: All versions

Qualcomm Video Collaboration VC1 Platform: All versions

Qualcomm Video Collaboration VC3 Platform: All versions

QXM8083: All versions

SA6155P: All versions

SA7255P: All versions

SA7775P: All versions

SA8155P: All versions

SA8195P: All versions

SA8255P: All versions

SA8295P: All versions

SA8530P: All versions

SA8540P: All versions

SA8620P: All versions

SA8650P: All versions

SA8770P: All versions

SA8775P: All versions

SA9000P: All versions

SDX55: All versions

SDX65M: All versions

SM6650: All versions

SM7635: All versions

SM7675: All versions

SM7675P: All versions

SM8550P: All versions

SM8635: All versions

SM8635P: All versions

SM8750: All versions

SM8750P: All versions

Snapdragon 8 Gen 2 Mobile Platform: All versions

Snapdragon 8 Gen 3 Mobile Platform: All versions

Snapdragon 8+ Gen 2 Mobile Platform: All versions

Snapdragon Auto 5G Modem-RF Gen 2: All versions

Snapdragon X65 5G Modem-RF System: All versions

Snapdragon X72 5G Modem-RF System: All versions

Snapdragon X75 5G Modem-RF System: All versions

SRV1H: All versions

SRV1L: All versions

SRV1M: All versions

SXR2230P: All versions

SXR2250P: All versions

SXR2330P: All versions

WCD9340: All versions

WCD9341: All versions

WCD9370: All versions

WCD9375: All versions

WCD9378: All versions

WCD9380: All versions

WCD9385: All versions

WCD9390: All versions

WCD9395: All versions

WCN3950: All versions

WCN3980: All versions

WCN3988: All versions

WCN6450: All versions

WCN6650: All versions

WCN6755: All versions

WCN7860: All versions

WCN7861: All versions

WCN7880: All versions

WCN7881: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8832: All versions

WSA8835: All versions

WSA8840: All versions

WSA8845: All versions

WSA8845H: All versions

CPE2.3 External links

https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Buffer overflow

EUVDB-ID: #VU102329

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-21464

CWE-ID: CWE-120 - Buffer overflow

Exploit availability: No

Description

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Data Network Stack & Connectivity. A local application can execute arbitrary code.

Mitigation

Install security update from vendor's website.

Vulnerable software versions

FastConnect 6700: All versions

FastConnect 6900: All versions

FastConnect 7800: All versions

QCM4490: All versions

QCS4490: All versions

Snapdragon 8 Gen 3 Mobile Platform: All versions

Snapdragon 8+ Gen 1 Mobile Platform: All versions

TalynPlus: All versions

WCD9370: All versions

WCD9390: All versions

WCD9395: All versions

WCN3950: All versions

WCN6740: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8832: All versions

WSA8835: All versions

WSA8840: All versions

WSA8845: All versions

WSA8845H: All versions

CPE2.3 External links

https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Buffer over-read

EUVDB-ID: #VU102328

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45559

CWE-ID: CWE-126 - Buffer over-read

Exploit availability: No

Description

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in Automotive OS Platform QNX. A local application can perform a denial of service (DoS) attack.

Mitigation

Install security update from vendor's website.

Vulnerable software versions

QAM8255P: All versions

QAM8295P: All versions

QAM8620P: All versions

QAM8650P: All versions

QAM8775P: All versions

QAMSRV1H: All versions

QAMSRV1M: All versions

QCA6595: All versions

QCA6595AU: All versions

QCA6696: All versions

SA7255P: All versions

SA7775P: All versions

SA8255P: All versions

SA8295P: All versions

SA8540P: All versions

SA8620P: All versions

SA8650P: All versions

SA8770P: All versions

SA8775P: All versions

SA9000P: All versions

SRV1H: All versions

SRV1L: All versions

SRV1M: All versions

CPE2.3 External links

https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Improper Validation of Array Index

EUVDB-ID: #VU102326

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45550

CWE-ID: CWE-129 - Improper Validation of Array Index

Exploit availability: No

Description

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in DSP Services. A local application can execute arbitrary code.

Mitigation

Install security update from vendor's website.

Vulnerable software versions

FastConnect 6900: All versions

FastConnect 7800: All versions

SC8380XP: All versions

WCD9380: All versions

WCD9385: All versions

WSA8840: All versions

WSA8845: All versions

WSA8845H: All versions

CPE2.3 External links

https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Buffer over-read

EUVDB-ID: #VU102325

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45548

CWE-ID: CWE-126 - Buffer over-read

Exploit availability: No

Description

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in WLAN Windows Host. A local application can execute arbitrary code.

Mitigation

Install security update from vendor's website.

Vulnerable software versions

FastConnect 6900: All versions

FastConnect 7800: All versions

QCC2073: All versions

QCC2076: All versions

SC8380XP: All versions

WCD9380: All versions

WCD9385: All versions

WSA8840: All versions

WSA8845: All versions

WSA8845H: All versions

CPE2.3 External links

https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Buffer overflow

EUVDB-ID: #VU102324

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45547

CWE-ID: CWE-120 - Buffer overflow

Exploit availability: No

Description

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in WLAN Windows Host. A local application can execute arbitrary code.

Mitigation

Install security update from vendor's website.

Vulnerable software versions

FastConnect 6900: All versions

FastConnect 7800: All versions

QCC2073: All versions

QCC2076: All versions

SC8380XP: All versions

WCD9380: All versions

WCD9385: All versions

WSA8840: All versions

WSA8845: All versions

WSA8845H: All versions

CPE2.3 External links

https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Buffer over-read

EUVDB-ID: #VU102323

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45546

CWE-ID: CWE-126 - Buffer over-read

Exploit availability: No

Description

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in WLAN Windows Host. A local application can execute arbitrary code.

Mitigation

Install security update from vendor's website.

Vulnerable software versions

FastConnect 6900: All versions

FastConnect 7800: All versions

QCC2073: All versions

QCC2076: All versions

SC8380XP: All versions

WCD9380: All versions

WCD9385: All versions

WSA8840: All versions

WSA8845: All versions

WSA8845H: All versions

CPE2.3 External links

https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Buffer overflow

EUVDB-ID: #VU102321

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45541

CWE-ID: CWE-120 - Buffer overflow

Exploit availability: No

Description

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in WLAN Windows Host. A local application can execute arbitrary code.

Mitigation

Install security update from vendor's website.

Vulnerable software versions

AQT1000: All versions

FastConnect 6200: All versions

FastConnect 6700: All versions

FastConnect 6800: All versions

FastConnect 6900: All versions

FastConnect 7800: All versions

QCA1062: All versions

QCA1064: All versions

QCA2062: All versions

QCA2064: All versions

QCA2065: All versions

QCA2066: All versions

QCA6391: All versions

QCA6420: All versions

QCA6430: All versions

QCA6595AU: All versions

QCC2073: All versions

QCC2076: All versions

QCM5430: All versions

QCM6490: All versions

QCN7605: All versions

QCN7606: All versions

QCS5430: All versions

QCS6490: All versions

Qualcomm Video Collaboration VC3 Platform: All versions

SC8180X+SDX55: All versions

SC8380XP: All versions

SM6250: All versions

Snapdragon 7c Compute Platform (SC7180-AC): All versions

Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro": All versions

Snapdragon 7c+ Gen 3 Compute: All versions

Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite": All versions

Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite": All versions

Snapdragon 8cx Compute Platform (SC8180X-AA: All versions

AB): All versions

Snapdragon 8cx Compute Platform (SC8180XP-AC: All versions

AF) "Poipu Pro": All versions

Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC: All versions

Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA: All versions

Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB: All versions

BB): All versions

WCD9340: All versions

WCD9341: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

WSA8840: All versions

WSA8845: All versions

WSA8845H: All versions

CPE2.3 External links

https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Use After Free

EUVDB-ID: #VU102330

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45553

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in DSP Services. A local application can execute arbitrary code.

Mitigation

Install security update from vendor's website.

Vulnerable software versions

AR8035: All versions

FastConnect 6200: All versions

FastConnect 6700: All versions

FastConnect 6900: All versions

FastConnect 7800: All versions

Flight RB5 5G Platform: All versions

QAM8255P: All versions

QAM8295P: All versions

QAM8620P: All versions

QAM8650P: All versions

QAM8775P: All versions

QAMSRV1H: All versions

QAMSRV1M: All versions

QCA6174A: All versions

QCA6391: All versions

QCA6574: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6584AU: All versions

QCA6595: All versions

QCA6595AU: All versions

QCA6688AQ: All versions

QCA6696: All versions

QCA6698AQ: All versions

QCA6797AQ: All versions

QCA8081: All versions

QCA8337: All versions

QCC710: All versions

QCM4325: All versions

QCM4490: All versions

QCN6224: All versions

QCN6274: All versions

QCS4490: All versions

QCS7230: All versions

QCS8250: All versions

QCS8550: All versions

QDU1000: All versions

QDU1010: All versions

QDU1110: All versions

QDU1210: All versions

QDX1010: All versions

QDX1011: All versions

QEP8111: All versions

QFW7114: All versions

QFW7124: All versions

QRB5165N: All versions

QRU1032: All versions

QRU1052: All versions

QRU1062: All versions

Qualcomm Video Collaboration VC5 Platform: All versions

Robotics RB5 Platform: All versions

SA6155P: All versions

SA7255P: All versions

SA7775P: All versions

SA8155P: All versions

SA8195P: All versions

SA8255P: All versions

SA8295P: All versions

SA8620P: All versions

SA8650P: All versions

SA8770P: All versions

SA8775P: All versions

SA9000P: All versions

SD 8 Gen1 5G: All versions

SG4150P: All versions

SM4635: All versions

SM6650: All versions

SM7635: All versions

SM7675: All versions

SM7675P: All versions

SM8550P: All versions

SM8635: All versions

SM8635P: All versions

Snapdragon 4 Gen 1 Mobile Platform: All versions

Snapdragon 4 Gen 2 Mobile Platform: All versions

Snapdragon 460 Mobile Platform: All versions

Snapdragon 480 5G Mobile Platform: All versions

Snapdragon 480+ 5G Mobile Platform (SM4350-AC): All versions

Snapdragon 662 Mobile Platform: All versions

Snapdragon 680 4G Mobile Platform: All versions

Snapdragon 685 4G Mobile Platform (SM6225-AD): All versions

Snapdragon 695 5G Mobile Platform: All versions

Snapdragon 8 Gen 1 Mobile Platform: All versions

Snapdragon 8 Gen 2 Mobile Platform: All versions

Snapdragon 8 Gen 3 Mobile Platform: All versions

Snapdragon 8+ Gen 1 Mobile Platform: All versions

Snapdragon 8+ Gen 2 Mobile Platform: All versions

Snapdragon AR1 Gen 1 Platform: All versions

Snapdragon AR1 Gen 1 Platform "Luna1": All versions

Snapdragon AR2 Gen 1 Platform: All versions

Snapdragon Auto 5G Modem-RF Gen 2: All versions

Snapdragon W5+ Gen 1 Wearable Platform: All versions

Snapdragon X35 5G Modem-RF System: All versions

Snapdragon X72 5G Modem-RF System: All versions

Snapdragon X75 5G Modem-RF System: All versions

SRV1H: All versions

SRV1L: All versions

SRV1M: All versions

SSG2115P: All versions

SSG2125P: All versions

SW5100: All versions

SW5100P: All versions

SXR1230P: All versions

SXR2230P: All versions

SXR2250P: All versions

TalynPlus: All versions

WCD9340: All versions

WCD9370: All versions

WCD9375: All versions

WCD9378: All versions

WCD9380: All versions

WCD9385: All versions

WCD9390: All versions

WCD9395: All versions

WCN3950: All versions

WCN3988: All versions

WCN6450: All versions

WCN6650: All versions

WCN6755: All versions

WCN7861: All versions

WCN7881: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8832: All versions

WSA8835: All versions

WSA8840: All versions

WSA8845: All versions

WSA8845H: All versions

CPE2.3 External links

https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU102320

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43064

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to improper input validation in Automotive OS Platform. A local privileged application can execute arbitrary code.

Mitigation

Install security update from vendor's website.

Vulnerable software versions

QAM8255P: All versions

QAM8295P: All versions

QAM8620P: All versions

QAM8650P: All versions

QAM8775P: All versions

QAMSRV1H: All versions

QAMSRV1M: All versions

QCA6574AU: All versions

QCA6595: All versions

QCA6595AU: All versions

QCA6688AQ: All versions

QCA6696: All versions

QCA6698AQ: All versions

SA7255P: All versions

SA7775P: All versions

SA8255P: All versions

SA8295P: All versions

SA8540P: All versions

SA8620P: All versions

SA8650P: All versions

SA8770P: All versions

SA8775P: All versions

SA9000P: All versions

SDM429W: All versions

Snapdragon 429 Mobile Platform: All versions

SRV1H: All versions

SRV1L: All versions

SRV1M: All versions

WCN3620: All versions

WCN3660B: All versions

CPE2.3 External links

https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Buffer over-read

EUVDB-ID: #VU102319

Risk: Low

CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-43063

CWE-ID: CWE-126 - Buffer over-read

Exploit availability: No

Description

The vulnerability allows a local application to read and manipulate data.

The vulnerability exists due to improper input validation in Automotive Autonomy. A local application can read and manipulate data.

Mitigation

Install security update from vendor's website.

Vulnerable software versions

QAM8255P: All versions

QAM8295P: All versions

QAM8650P: All versions

QAM8775P: All versions

QAMSRV1H: All versions

QCA6595: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA6698AQ: All versions

SA8255P: All versions

SA8295P: All versions

SA8540P: All versions

SA8650P: All versions

SA8770P: All versions

SA8775P: All versions

SA9000P: All versions

SRV1H: All versions

CPE2.3 External links

https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Buffer over-read

EUVDB-ID: #VU102318

Risk: Low

CVSSv4.0: 4.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-23366

CWE-ID: CWE-126 - Buffer over-read

Exploit availability: No

Description

The vulnerability allows a local application to read, manipulate or delete data.

The vulnerability exists due to improper input validation in Automotive Autonomy. A local application can read, manipulate or delete data.

Mitigation

Install security update from vendor's website.

Vulnerable software versions

QAM8255P: All versions

QAM8295P: All versions

QAM8650P: All versions

QAM8775P: All versions

QAMSRV1H: All versions

QCA6595: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA6698AQ: All versions

SA8255P: All versions

SA8295P: All versions

SA8540P: All versions

SA8650P: All versions

SA8770P: All versions

SA8775P: All versions

SA9000P: All versions

SRV1H: All versions

CPE2.3 External links

https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Buffer over-read

EUVDB-ID: #VU102336

Risk: Low

CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-33067

CWE-ID: CWE-126 - Buffer over-read

Exploit availability: No

Description

The vulnerability allows a local application to read and manipulate data.

The vulnerability exists due to improper input validation in Audio. A local application can read and manipulate data.

Mitigation

Install security update from vendor's website.

Vulnerable software versions

AR8035: All versions

C-V2X 9150: All versions

CSRB31024: All versions

FastConnect 6800: All versions

FastConnect 6900: All versions

FastConnect 7800: All versions

MSM8996AU: All versions

QAM8295P: All versions

QCA6310: All versions

QCA6320: All versions

QCA6391: All versions

QCA6426: All versions

QCA6436: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6584AU: All versions

QCA6595AU: All versions

QCA6696: All versions

QCA6698AQ: All versions

QCA8081: All versions

QCA8337: All versions

QCA9367: All versions

QCA9377: All versions

QCC710: All versions

QCN6224: All versions

QCN6274: All versions

QCN9074: All versions

QCS410: All versions

QCS610: All versions

QFW7114: All versions

QFW7124: All versions

QSM8250: All versions

Qualcomm Video Collaboration VC1 Platform: All versions

Qualcomm Video Collaboration VC3 Platform: All versions

SA6145P: All versions

SA6150P: All versions

SA6155P: All versions

SA8145P: All versions

SA8150P: All versions

SA8155P: All versions

SA8195P: All versions

SA8295P: All versions

SA8530P: All versions

SA8540P: All versions

SA9000P: All versions

SD835: All versions

SD865 5G: All versions

SDM429W: All versions

SDX55: All versions

Snapdragon 429 Mobile Platform: All versions

Snapdragon 820 Automotive Platform: All versions

Snapdragon 835 Mobile PC Platform: All versions

Snapdragon 865 5G Mobile Platform: All versions

Snapdragon 865+ 5G Mobile Platform (SM8250-AB): All versions

Snapdragon 870 5G Mobile Platform (SM8250-AC): All versions

Snapdragon Auto 5G Modem-RF Gen 2: All versions

Snapdragon X55 5G Modem-RF System: All versions

Snapdragon X72 5G Modem-RF System: All versions

Snapdragon X75 5G Modem-RF System: All versions

Snapdragon XR2 5G Platform: All versions

Snapdragon Auto 4G Modem: All versions

SXR2130: All versions

WCD9335: All versions

WCD9340: All versions

WCD9341: All versions

WCD9370: All versions

WCD9380: All versions

WCN3620: All versions

WCN3660B: All versions

WCN3680B: All versions

WCN3950: All versions

WCN3980: All versions

WCN3990: All versions

WSA8810: All versions

WSA8815: All versions

CPE2.3 External links

https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Use After Free

EUVDB-ID: #VU102334

Risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-33059

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to improper input validation in Computer Vision. A local privileged application can execute arbitrary code.

Mitigation

Install security update from vendor's website.

Vulnerable software versions

FastConnect 6900: All versions

FastConnect 7800: All versions

QCM8550: All versions

QCS8550: All versions

SG8275P: All versions

SM8550P: All versions

Snapdragon 8 Gen 2 Mobile Platform: All versions

Snapdragon 8 Gen 3 Mobile Platform: All versions

Snapdragon 8+ Gen 2 Mobile Platform: All versions

WCD9380: All versions

WCD9385: All versions

WCD9390: All versions

WCD9395: All versions

WSA8840: All versions

WSA8845: All versions

WSA8845H: All versions

CPE2.3 External links

https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Buffer over-read

EUVDB-ID: #VU102335

Risk: Low

CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-33061

CWE-ID: CWE-126 - Buffer over-read

Exploit availability: No

Description

The vulnerability allows a local application to read and manipulate data.

The vulnerability exists due to improper input validation in DSP Service. A local application can read and manipulate data.

Mitigation

Install security update from vendor's website.

Vulnerable software versions

QCS8550: All versions

SW5100: All versions

SW5100P: All versions

WCN3660B: All versions

WCN3680B: All versions

WCN3980: All versions

WCN3988: All versions

WSA8830: All versions

WSA8835: All versions

CPE2.3 External links

https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Use After Free

EUVDB-ID: #VU102333

Risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-33055

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to improper input validation in Computer Vision. A local privileged application can execute arbitrary code.

Mitigation

Install security update from vendor's website.

Vulnerable software versions

FastConnect 6900: All versions

FastConnect 7800: All versions

QAM8295P: All versions

QCA6574AU: All versions

QCA6696: All versions

QCM8550: All versions

QCS6490: All versions

QCS8550: All versions

Qualcomm Video Collaboration VC3 Platform: All versions

SA6145P: All versions

SA6150P: All versions

SA6155P: All versions

SA8145P: All versions

SA8150P: All versions

SA8155P: All versions

SA8195P: All versions

SA8295P: All versions

SD 8 Gen1 5G: All versions

SG8275P: All versions

SM8550P: All versions

Snapdragon 8 Gen 2 Mobile Platform: All versions

Snapdragon 8 Gen 3 Mobile Platform: All versions

Snapdragon 8+ Gen 2 Mobile Platform: All versions

Snapdragon AR2 Gen 1 Platform: All versions

SSG2115P: All versions

SSG2125P: All versions

SXR1230P: All versions

SXR2230P: All versions

SXR2250P: All versions

WCD9380: All versions

WCD9385: All versions

WCD9390: All versions

WCD9395: All versions

WSA8830: All versions

WSA8832: All versions

WSA8835: All versions

WSA8840: All versions

WSA8845: All versions

WSA8845H: All versions

CPE2.3 External links

https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Use of Out-of-range Pointer Offset

EUVDB-ID: #VU102332

Risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-33041

CWE-ID: CWE-823 - Use of Out-of-range Pointer Offset

Exploit availability: No

Description

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to improper input validation in Computer Vision. A local privileged application can execute arbitrary code.

Mitigation

Install security update from vendor's website.

Vulnerable software versions

FastConnect 6900: All versions

FastConnect 7800: All versions

QAM8295P: All versions

QCA6574AU: All versions

QCA6696: All versions

QCM8550: All versions

QCS6490: All versions

QCS8550: All versions

Qualcomm Video Collaboration VC3 Platform: All versions

SA6145P: All versions

SA6150P: All versions

SA6155P: All versions

SA8145P: All versions

SA8150P: All versions

SA8155P: All versions

SA8195P: All versions

SA8295P: All versions

SG8275P: All versions

SM8550P: All versions

Snapdragon 8 Gen 2 Mobile Platform: All versions

Snapdragon 8 Gen 3 Mobile Platform: All versions

Snapdragon 8+ Gen 2 Mobile Platform: All versions

SSG2115P: All versions

SSG2125P: All versions

SXR1230P: All versions

WCD9380: All versions

WCD9385: All versions

WCD9390: All versions

WCD9395: All versions

WSA8830: All versions

WSA8832: All versions

WSA8835: All versions

WSA8840: All versions

WSA8845: All versions

WSA8845H: All versions

CPE2.3 External links

https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Out-of-bounds write

EUVDB-ID: #VU102327

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45555

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Automotive OS Platform QNX. A local application can execute arbitrary code.

Mitigation

Install security update from vendor's website.

Vulnerable software versions

MSM8996AU: All versions

QAM8255P: All versions

QAM8295P: All versions

QAM8620P: All versions

QAM8650P: All versions

QAM8775P: All versions

QAMSRV1H: All versions

QAMSRV1M: All versions

QCA6564A: All versions

QCA6564AU: All versions

QCA6574A: All versions

QCA6574AU: All versions

QCA6584AU: All versions

QCA6595: All versions

QCA6595AU: All versions

QCA6688AQ: All versions

QCA6696: All versions

QCA6698AQ: All versions

SA6145P: All versions

SA6150P: All versions

SA6155: All versions

SA6155P: All versions

SA7255P: All versions

SA7775P: All versions

SA8145P: All versions

SA8150P: All versions

SA8155: All versions

SA8155P: All versions

SA8195P: All versions

SA8255P: All versions

SA8295P: All versions

SA8540P: All versions

SA8620P: All versions

SA8650P: All versions

SA8770P: All versions

SA8775P: All versions

SA9000P: All versions

Snapdragon 820 Automotive Platform: All versions

SRV1H: All versions

SRV1L: All versions

SRV1M: All versions

CPE2.3 External links

https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###