Vulnerability identifier: #VU99683
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-33031
CWE-ID:
CWE-20
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
AR8035
Mobile applications /
Mobile firmware & hardware
FastConnect 7800
Mobile applications /
Mobile firmware & hardware
QCA8081
Mobile applications /
Mobile firmware & hardware
QCA8337
Mobile applications /
Mobile firmware & hardware
QCC710
Mobile applications /
Mobile firmware & hardware
QCN6224
Mobile applications /
Mobile firmware & hardware
QCN6274
Mobile applications /
Mobile firmware & hardware
QFW7114
Mobile applications /
Mobile firmware & hardware
QFW7124
Mobile applications /
Mobile firmware & hardware
Snapdragon 429 Mobile Platform
Mobile applications /
Mobile firmware & hardware
Snapdragon X72 5G Modem-RF System
Mobile applications /
Mobile firmware & hardware
Snapdragon X75 5G Modem-RF System
Mobile applications /
Mobile firmware & hardware
WCD9340
Mobile applications /
Mobile firmware & hardware
WCN3620
Mobile applications /
Mobile firmware & hardware
WCN3660B
Mobile applications /
Mobile firmware & hardware
SDM429W
Hardware solutions /
Firmware
Vendor: Qualcomm
Description
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to improper input validation in RIL. A local privileged application can execute arbitrary code.
Mitigation
Install security update from vendor's website.
Vulnerable software versions
AR8035: All versions
FastConnect 7800: All versions
QCA8081: All versions
QCA8337: All versions
QCC710: All versions
QCN6224: All versions
QCN6274: All versions
QFW7114: All versions
QFW7124: All versions
SDM429W: All versions
Snapdragon 429 Mobile Platform: All versions
Snapdragon X72 5G Modem-RF System: All versions
Snapdragon X75 5G Modem-RF System: All versions
WCD9340: All versions
WCN3620: All versions
WCN3660B: All versions
External links
https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.