#VU102322 Stack-based buffer overflow in Qualcomm products - CVE-2024-45542


Vulnerability identifier: #VU102322

Vulnerability risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-45542

CWE-ID: CWE-121

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
AQT1000
Mobile applications / Mobile firmware & hardware
FastConnect 6200
Mobile applications / Mobile firmware & hardware
FastConnect 6700
Mobile applications / Mobile firmware & hardware
FastConnect 6800
Mobile applications / Mobile firmware & hardware
FastConnect 6900
Mobile applications / Mobile firmware & hardware
FastConnect 7800
Mobile applications / Mobile firmware & hardware
QCA1062
Mobile applications / Mobile firmware & hardware
QCA1064
Mobile applications / Mobile firmware & hardware
QCA2062
Mobile applications / Mobile firmware & hardware
QCA2064
Mobile applications / Mobile firmware & hardware
QCA2065
Mobile applications / Mobile firmware & hardware
QCA2066
Mobile applications / Mobile firmware & hardware
QCA6391
Mobile applications / Mobile firmware & hardware
QCA6420
Mobile applications / Mobile firmware & hardware
QCA6430
Mobile applications / Mobile firmware & hardware
QCA6595AU
Mobile applications / Mobile firmware & hardware
QCC2073
Mobile applications / Mobile firmware & hardware
QCC2076
Mobile applications / Mobile firmware & hardware
QCM5430
Mobile applications / Mobile firmware & hardware
QCM6490
Mobile applications / Mobile firmware & hardware
QCN7606
Mobile applications / Mobile firmware & hardware
QCS5430
Mobile applications / Mobile firmware & hardware
QCS6490
Mobile applications / Mobile firmware & hardware
Qualcomm Video Collaboration VC3 Platform
Mobile applications / Mobile firmware & hardware
SC8180X+SDX55
Mobile applications / Mobile firmware & hardware
SC8380XP
Mobile applications / Mobile firmware & hardware
SM6250
Mobile applications / Mobile firmware & hardware
Snapdragon 7c Compute Platform (SC7180-AC)
Mobile applications / Mobile firmware & hardware
Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro"
Mobile applications / Mobile firmware & hardware
Snapdragon 7c+ Gen 3 Compute
Mobile applications / Mobile firmware & hardware
Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite"
Mobile applications / Mobile firmware & hardware
Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite"
Mobile applications / Mobile firmware & hardware
Snapdragon 8cx Compute Platform (SC8180X-AA
Mobile applications / Mobile firmware & hardware
AB)
Mobile applications / Mobile firmware & hardware
Snapdragon 8cx Compute Platform (SC8180XP-AC
Mobile applications / Mobile firmware & hardware
AF) "Poipu Pro"
Mobile applications / Mobile firmware & hardware
Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC
Mobile applications / Mobile firmware & hardware
Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA
Mobile applications / Mobile firmware & hardware
Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB
Mobile applications / Mobile firmware & hardware
BB)
Mobile applications / Mobile firmware & hardware
WCD9340
Mobile applications / Mobile firmware & hardware
WCD9341
Mobile applications / Mobile firmware & hardware
WCD9370
Mobile applications / Mobile firmware & hardware
WCD9375
Mobile applications / Mobile firmware & hardware
WCD9380
Mobile applications / Mobile firmware & hardware
WCD9385
Mobile applications / Mobile firmware & hardware
WSA8810
Mobile applications / Mobile firmware & hardware
WSA8815
Mobile applications / Mobile firmware & hardware
WSA8830
Mobile applications / Mobile firmware & hardware
WSA8835
Mobile applications / Mobile firmware & hardware
WSA8840
Mobile applications / Mobile firmware & hardware
WSA8845
Mobile applications / Mobile firmware & hardware
WSA8845H
Mobile applications / Mobile firmware & hardware
QCN7605
Hardware solutions / Firmware

Vendor: Qualcomm

Description

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in WLAN Windows Host. A local application can execute arbitrary code.

Mitigation
Install security update from vendor's website.

Vulnerable software versions

AQT1000: All versions

FastConnect 6200: All versions

FastConnect 6700: All versions

FastConnect 6800: All versions

FastConnect 6900: All versions

FastConnect 7800: All versions

QCA1062: All versions

QCA1064: All versions

QCA2062: All versions

QCA2064: All versions

QCA2065: All versions

QCA2066: All versions

QCA6391: All versions

QCA6420: All versions

QCA6430: All versions

QCA6595AU: All versions

QCC2073: All versions

QCC2076: All versions

QCM5430: All versions

QCM6490: All versions

QCN7605: All versions

QCN7606: All versions

QCS5430: All versions

QCS6490: All versions

Qualcomm Video Collaboration VC3 Platform: All versions

SC8180X+SDX55: All versions

SC8380XP: All versions

SM6250: All versions

Snapdragon 7c Compute Platform (SC7180-AC): All versions

Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro": All versions

Snapdragon 7c+ Gen 3 Compute: All versions

Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite": All versions

Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite": All versions

Snapdragon 8cx Compute Platform (SC8180X-AA: All versions

AB): All versions

Snapdragon 8cx Compute Platform (SC8180XP-AC: All versions

AF) "Poipu Pro": All versions

Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC: All versions

Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA: All versions

Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB: All versions

BB): All versions

WCD9340: All versions

WCD9341: All versions

WCD9370: All versions

WCD9375: All versions

WCD9380: All versions

WCD9385: All versions

WSA8810: All versions

WSA8815: All versions

WSA8830: All versions

WSA8835: All versions

WSA8840: All versions

WSA8845: All versions

WSA8845H: All versions


External links
https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability