CVE-2024-33041

Jan. 10, 2025, 5:15 p.m.

6.7
Medium

Description

Memory corruption when input parameter validation for number of fences is missing for fence frame IOCTL calls,

Product(s) Impacted

Vendor Product Versions
Qualcomm
  • Fastconnect 6900 Firmware
  • Fastconnect 6900
  • Fastconnect 7800 Firmware
  • Fastconnect 7800
  • Qam8295p Firmware
  • Qam8295p
  • Qca6574au Firmware
  • Qca6574au
  • Qca6696 Firmware
  • Qca6696
  • Qcm8550 Firmware
  • Qcm8550
  • Qcs6490 Firmware
  • Qcs6490
  • Qcs8550 Firmware
  • Qcs8550
  • Video Collaboration Vc3 Firmware
  • Video Collaboration Vc3
  • Sa6145p Firmware
  • Sa6145p
  • Sa6150p Firmware
  • Sa6150p
  • Sa6155p Firmware
  • Sa6155p
  • Sa8145p Firmware
  • Sa8145p
  • Sa8150p Firmware
  • Sa8150p
  • Sa8155p Firmware
  • Sa8155p
  • Sa8195p Firmware
  • Sa8195p
  • Sa8295p Firmware
  • Sa8295p
  • Sg8275p Firmware
  • Sg8275p
  • Sm8550p Firmware
  • Sm8550p
  • Snapdragon 8 Gen 2 Mobile Firmware
  • Snapdragon 8 Gen 2 Mobile
  • Snapdragon 8 Gen 3 Mobile Firmware
  • Snapdragon 8 Gen 3 Mobile
  • Snapdragon 8\+ Gen 2 Mobile Firmware
  • Snapdragon 8\+ Gen 2 Mobile
  • Ssg2115p Firmware
  • Ssg2115p
  • Ssg2125p Firmware
  • Ssg2125p
  • Sxr1230p Firmware
  • Sxr1230p
  • Wcd9380 Firmware
  • Wcd9380
  • Wcd9385 Firmware
  • Wcd9385
  • Wcd9390 Firmware
  • Wcd9390
  • Wcd9395 Firmware
  • Wcd9395
  • Wsa8830 Firmware
  • Wsa8830
  • Wsa8832 Firmware
  • Wsa8832
  • Wsa8835 Firmware
  • Wsa8835
  • Wsa8840 Firmware
  • Wsa8840
  • Wsa8845 Firmware
  • Wsa8845
  • Wsa8845h Firmware
  • Wsa8845h
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-787
Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.
CWE-823
Use of Out-of-range Pointer Offset
The product performs pointer arithmetic on a valid pointer, but it uses an offset that can point outside of the intended range of valid memory locations for the resulting pointer.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
o qualcomm fastconnect_6900_firmware - / / / / / / /
h qualcomm fastconnect_6900 - / / / / / / /
o qualcomm fastconnect_7800_firmware - / / / / / / /
h qualcomm fastconnect_7800 - / / / / / / /
o qualcomm qam8295p_firmware - / / / / / / /
h qualcomm qam8295p - / / / / / / /
o qualcomm qca6574au_firmware - / / / / / / /
h qualcomm qca6574au - / / / / / / /
o qualcomm qca6696_firmware - / / / / / / /
h qualcomm qca6696 - / / / / / / /
o qualcomm qcm8550_firmware - / / / / / / /
h qualcomm qcm8550 - / / / / / / /
o qualcomm qcs6490_firmware - / / / / / / /
h qualcomm qcs6490 - / / / / / / /
o qualcomm qcs8550_firmware - / / / / / / /
h qualcomm qcs8550 - / / / / / / /
o qualcomm video_collaboration_vc3_firmware - / / / / / / /
h qualcomm video_collaboration_vc3 - / / / / / / /
o qualcomm sa6145p_firmware - / / / / / / /
h qualcomm sa6145p - / / / / / / /
o qualcomm sa6150p_firmware - / / / / / / /
h qualcomm sa6150p - / / / / / / /
o qualcomm sa6155p_firmware - / / / / / / /
h qualcomm sa6155p - / / / / / / /
o qualcomm sa8145p_firmware - / / / / / / /
h qualcomm sa8145p - / / / / / / /
o qualcomm sa8150p_firmware - / / / / / / /
h qualcomm sa8150p - / / / / / / /
o qualcomm sa8155p_firmware - / / / / / / /
h qualcomm sa8155p - / / / / / / /
o qualcomm sa8195p_firmware - / / / / / / /
h qualcomm sa8195p - / / / / / / /
o qualcomm sa8295p_firmware - / / / / / / /
h qualcomm sa8295p - / / / / / / /
o qualcomm sg8275p_firmware - / / / / / / /
h qualcomm sg8275p - / / / / / / /
o qualcomm sm8550p_firmware - / / / / / / /
h qualcomm sm8550p - / / / / / / /
o qualcomm snapdragon_8_gen_2_mobile_firmware - / / / / / / /
h qualcomm snapdragon_8_gen_2_mobile - / / / / / / /
o qualcomm snapdragon_8_gen_3_mobile_firmware - / / / / / / /
h qualcomm snapdragon_8_gen_3_mobile - / / / / / / /
o qualcomm snapdragon_8\+_gen_2_mobile_firmware - / / / / / / /
h qualcomm snapdragon_8\+_gen_2_mobile - / / / / / / /
o qualcomm ssg2115p_firmware - / / / / / / /
h qualcomm ssg2115p - / / / / / / /
o qualcomm ssg2125p_firmware - / / / / / / /
h qualcomm ssg2125p - / / / / / / /
o qualcomm sxr1230p_firmware - / / / / / / /
h qualcomm sxr1230p - / / / / / / /
o qualcomm wcd9380_firmware - / / / / / / /
h qualcomm wcd9380 - / / / / / / /
o qualcomm wcd9385_firmware - / / / / / / /
h qualcomm wcd9385 - / / / / / / /
o qualcomm wcd9390_firmware - / / / / / / /
h qualcomm wcd9390 - / / / / / / /
o qualcomm wcd9395_firmware - / / / / / / /
h qualcomm wcd9395 - / / / / / / /
o qualcomm wsa8830_firmware - / / / / / / /
h qualcomm wsa8830 - / / / / / / /
o qualcomm wsa8832_firmware - / / / / / / /
h qualcomm wsa8832 - / / / / / / /
o qualcomm wsa8835_firmware - / / / / / / /
h qualcomm wsa8835 - / / / / / / /
o qualcomm wsa8840_firmware - / / / / / / /
h qualcomm wsa8840 - / / / / / / /
o qualcomm wsa8845_firmware - / / / / / / /
h qualcomm wsa8845 - / / / / / / /
o qualcomm wsa8845h_firmware - / / / / / / /
h qualcomm wsa8845h - / / / / / / /

CVSS Score

6.7 / 10

CVSS Data - 3.1

  • Attack Vector: LOCAL
  • Attack Complexity: LOW
  • Privileges Required: HIGH
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

    View Vector String

Timeline

Published: Jan. 6, 2025, 11:15 a.m.
Last Modified: Jan. 10, 2025, 5:15 p.m.

Status : Analyzed

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

product-security@qualcomm.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.