CVE-2024-21464

Jan. 10, 2025, 5:22 p.m.

8.4
High

Description

Memory corruption while processing IPA statistics, when there are no active clients registered.

Product(s) Impacted

Vendor Product Versions
Qualcomm
  • Fastconnect 6700 Firmware
  • Fastconnect 6700
  • Fastconnect 6900 Firmware
  • Fastconnect 6900
  • Fastconnect 7800 Firmware
  • Fastconnect 7800
  • Qcm4490 Firmware
  • Qcm4490
  • Qcs4490 Firmware
  • Qcs4490
  • Snapdragon 8 Gen 3 Mobile Firmware
  • Snapdragon 8 Gen 3 Mobile
  • Snapdragon 8\+ Gen 1 Mobile Firmware
  • Snapdragon 8\+ Gen 1 Mobile
  • Talynplus Firmware
  • Talynplus
  • Wcd9370 Firmware
  • Wcd9370
  • Wcd9390 Firmware
  • Wcd9390
  • Wcd9395 Firmware
  • Wcd9395
  • Wcn3950 Firmware
  • Wcn3950
  • Wcn6740 Firmware
  • Wcn6740
  • Wsa8810 Firmware
  • Wsa8810
  • Wsa8815 Firmware
  • Wsa8815
  • Wsa8830 Firmware
  • Wsa8830
  • Wsa8832 Firmware
  • Wsa8832
  • Wsa8835 Firmware
  • Wsa8835
  • Wsa8840 Firmware
  • Wsa8840
  • Wsa8845 Firmware
  • Wsa8845
  • Wsa8845h Firmware
  • Wsa8845h
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -

Weaknesses

CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.

*CPE(s)

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
o qualcomm fastconnect_6700_firmware - / / / / / / /
h qualcomm fastconnect_6700 - / / / / / / /
o qualcomm fastconnect_6900_firmware - / / / / / / /
h qualcomm fastconnect_6900 - / / / / / / /
o qualcomm fastconnect_7800_firmware - / / / / / / /
h qualcomm fastconnect_7800 - / / / / / / /
o qualcomm qcm4490_firmware - / / / / / / /
h qualcomm qcm4490 - / / / / / / /
o qualcomm qcs4490_firmware - / / / / / / /
h qualcomm qcs4490 - / / / / / / /
o qualcomm snapdragon_8_gen_3_mobile_firmware - / / / / / / /
h qualcomm snapdragon_8_gen_3_mobile - / / / / / / /
o qualcomm snapdragon_8\+_gen_1_mobile_firmware - / / / / / / /
h qualcomm snapdragon_8\+_gen_1_mobile - / / / / / / /
o qualcomm talynplus_firmware - / / / / / / /
h qualcomm talynplus - / / / / / / /
o qualcomm wcd9370_firmware - / / / / / / /
h qualcomm wcd9370 - / / / / / / /
o qualcomm wcd9390_firmware - / / / / / / /
h qualcomm wcd9390 - / / / / / / /
o qualcomm wcd9395_firmware - / / / / / / /
h qualcomm wcd9395 - / / / / / / /
o qualcomm wcn3950_firmware - / / / / / / /
h qualcomm wcn3950 - / / / / / / /
o qualcomm wcn6740_firmware - / / / / / / /
h qualcomm wcn6740 - / / / / / / /
o qualcomm wsa8810_firmware - / / / / / / /
h qualcomm wsa8810 - / / / / / / /
o qualcomm wsa8815_firmware - / / / / / / /
h qualcomm wsa8815 - / / / / / / /
o qualcomm wsa8830_firmware - / / / / / / /
h qualcomm wsa8830 - / / / / / / /
o qualcomm wsa8832_firmware - / / / / / / /
h qualcomm wsa8832 - / / / / / / /
o qualcomm wsa8835_firmware - / / / / / / /
h qualcomm wsa8835 - / / / / / / /
o qualcomm wsa8840_firmware - / / / / / / /
h qualcomm wsa8840 - / / / / / / /
o qualcomm wsa8845_firmware - / / / / / / /
h qualcomm wsa8845 - / / / / / / /
o qualcomm wsa8845h_firmware - / / / / / / /
h qualcomm wsa8845h - / / / / / / /

CVSS Score

8.4 / 10

CVSS Data

  • Attack Vector: LOCAL
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • View Vector String

    CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Date

  • Published: Jan. 6, 2025, 11:15 a.m.
  • Last Modified: Jan. 10, 2025, 5:22 p.m.

Status : Analyzed

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

product-security@qualcomm.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.