Cyber Posture

CVE-2024-45560

High

Published: 03 February 2025

Published
03 February 2025
Modified
05 February 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0009 24.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Memory corruption while taking a snapshot with hardware encoder due to unvalidated userspace buffer.

Security Summary

CVE-2024-45560 is a memory corruption vulnerability that occurs while taking a snapshot with a hardware encoder due to an unvalidated userspace buffer. It affects Qualcomm components, as detailed in the vendor's security bulletin. The issue is classified under CWE-367 and carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity with potential for significant impact on confidentiality, integrity, and availability.

A local attacker with low privileges can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation could lead to high-impact outcomes, including unauthorized data access, modification, or system disruption, stemming from the memory corruption triggered by the unvalidated buffer during hardware encoder snapshot operations.

Qualcomm has addressed this issue in their February 2025 security bulletin, available at https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html, which provides details on affected products and recommended patches or mitigations for security practitioners to apply.

Details

CWE(s)
CWE-367

Affected Products

qualcomm
aqt1000 firmware
all versions
qualcomm
fastconnect 6200 firmware
all versions
qualcomm
fastconnect 6700 firmware
all versions
qualcomm
fastconnect 6800 firmware
all versions
qualcomm
fastconnect 6900 firmware
all versions
qualcomm
fastconnect 7800 firmware
all versions
qualcomm
qca6391 firmware
all versions
qualcomm
qca6420 firmware
all versions
qualcomm
qca6430 firmware
all versions
qualcomm
qcm5430 firmware
all versions
+27 more product configuration(s) — see NVD for full list

References