CVE-2024-21455

Oct. 16, 2024, 8:30 p.m.

7.8
High

Description

Memory corruption when a compat IOCTL call is followed by another IOCTL call from userspace to a driver.

Product(s) Impacted

Vendor Product Versions
Qualcomm
  • Qualcomm Video Collaboration Vc1 Platform Firmware
  • Qualcomm Video Collaboration Vc1 Platform
  • Wsa8815 Firmware
  • Wsa8815
  • Wsa8810 Firmware
  • Wsa8810
  • Wcn3980 Firmware
  • Wcn3980
  • Wcn3950 Firmware
  • Wcn3950
  • Wcd9375 Firmware
  • Wcd9375
  • Wcd9370 Firmware
  • Wcd9370
  • Snapdragon Auto 5g Modem-rf Gen 2 Firmware
  • Snapdragon Auto 5g Modem-rf Gen 2
  • Snapdragon 685 4g Mobile Platform \(sm6225-ad\) Firmware
  • Snapdragon 685 4g Mobile Platform \(sm6225-ad\)
  • Snapdragon 680 4g Mobile Platform Firmware
  • Snapdragon 680 4g Mobile Platform
  • Sg4150p Firmware
  • Sg4150p
  • Sa8295p Firmware
  • Sa8295p
  • Qcs6125 Firmware
  • Qcs6125
  • Qcm6125 Firmware
  • Qcm6125
  • Qca6698aq Firmware
  • Qca6698aq
  • Qca6696 Firmware
  • Qca6696
  • Qca6688aq Firmware
  • Qca6688aq
  • Qca6595 Firmware
  • Qca6595
  • Qca6584au Firmware
  • Qca6584au
  • Qam8295p Firmware
  • Qam8295p
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
CWE-822
Untrusted Pointer Dereference
The product obtains a value from an untrusted source, converts this value to a pointer, and dereferences the resulting pointer.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
o qualcomm qualcomm_video_collaboration_vc1_platform_firmware - / / / / / / /
h qualcomm qualcomm_video_collaboration_vc1_platform - / / / / / / /
o qualcomm wsa8815_firmware - / / / / / / /
h qualcomm wsa8815 - / / / / / / /
o qualcomm wsa8810_firmware - / / / / / / /
h qualcomm wsa8810 - / / / / / / /
o qualcomm wcn3980_firmware - / / / / / / /
h qualcomm wcn3980 - / / / / / / /
o qualcomm wcn3950_firmware - / / / / / / /
h qualcomm wcn3950 - / / / / / / /
o qualcomm wcd9375_firmware - / / / / / / /
h qualcomm wcd9375 - / / / / / / /
o qualcomm wcd9370_firmware - / / / / / / /
h qualcomm wcd9370 - / / / / / / /
o qualcomm snapdragon_auto_5g_modem-rf_gen_2_firmware - / / / / / / /
h qualcomm snapdragon_auto_5g_modem-rf_gen_2 - / / / / / / /
o qualcomm snapdragon_685_4g_mobile_platform_\(sm6225-ad\)_firmware - / / / / / / /
h qualcomm snapdragon_685_4g_mobile_platform_\(sm6225-ad\) - / / / / / / /
o qualcomm snapdragon_680_4g_mobile_platform_firmware - / / / / / / /
h qualcomm snapdragon_680_4g_mobile_platform - / / / / / / /
o qualcomm sg4150p_firmware - / / / / / / /
h qualcomm sg4150p - / / / / / / /
o qualcomm sa8295p_firmware - / / / / / / /
h qualcomm sa8295p - / / / / / / /
o qualcomm qcs6125_firmware - / / / / / / /
h qualcomm qcs6125 - / / / / / / /
o qualcomm qcm6125_firmware - / / / / / / /
h qualcomm qcm6125 - / / / / / / /
o qualcomm qca6698aq_firmware - / / / / / / /
h qualcomm qca6698aq - / / / / / / /
o qualcomm qca6696_firmware - / / / / / / /
h qualcomm qca6696 - / / / / / / /
o qualcomm qca6688aq_firmware - / / / / / / /
h qualcomm qca6688aq - / / / / / / /
o qualcomm qca6595_firmware - / / / / / / /
h qualcomm qca6595 - / / / / / / /
o qualcomm qca6584au_firmware - / / / / / / /
h qualcomm qca6584au - / / / / / / /
o qualcomm qam8295p_firmware - / / / / / / /
h qualcomm qam8295p - / / / / / / /

CVSS Score

7.8 / 10

CVSS Data - 3.1

  • Attack Vector: LOCAL
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

    View Vector String

Timeline

Published: Oct. 7, 2024, 1:15 p.m.
Last Modified: Oct. 16, 2024, 8:30 p.m.

Status : Analyzed

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

product-security@qualcomm.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.