CVE-2024-33055

Jan. 10, 2025, 5:01 p.m.

6.7
Medium

Description

Memory corruption while invoking IOCTL calls to unmap the DMA buffers.

Product(s) Impacted

Vendor Product Versions
Qualcomm
  • Fastconnect 6900 Firmware
  • Fastconnect 6900
  • Fastconnect 7800 Firmware
  • Fastconnect 7800
  • Qam8295p Firmware
  • Qam8295p
  • Qca6574au Firmware
  • Qca6574au
  • Qca6696 Firmware
  • Qca6696
  • Qcm8550 Firmware
  • Qcm8550
  • Qcs6490 Firmware
  • Qcs6490
  • Qcs8550 Firmware
  • Qcs8550
  • Video Collaboration Vc3 Firmware
  • Video Collaboration Vc3
  • Sa6145p Firmware
  • Sa6145p
  • Sa6150p Firmware
  • Sa6150p
  • Sa6155p Firmware
  • Sa6155p
  • Sa8145p Firmware
  • Sa8145p
  • Sa8150p Firmware
  • Sa8150p
  • Sa8155p Firmware
  • Sa8155p
  • Sa8195p Firmware
  • Sa8195p
  • Sa8295p Firmware
  • Sa8295p
  • Sd 8 Gen1 5g Firmware
  • Sd 8 Gen1 5g
  • Sg8275p Firmware
  • Sg8275p
  • Sm8550p Firmware
  • Sm8550p
  • Snapdragon 8 Gen 2 Mobile Firmware
  • Snapdragon 8 Gen 2 Mobile
  • Snapdragon 8 Gen 3 Mobile Firmware
  • Snapdragon 8 Gen 3 Mobile
  • Snapdragon 8\+ Gen 2 Mobile Firmware
  • Snapdragon 8\+ Gen 2 Mobile
  • Snapdragon Ar2 Gen 1 Firmware
  • Snapdragon Ar2 Gen 1
  • Ssg2115p Firmware
  • Ssg2115p
  • Ssg2125p Firmware
  • Ssg2125p
  • Sxr1230p Firmware
  • Sxr1230p
  • Sxr2230p Firmware
  • Sxr2230p
  • Sxr2250p Firmware
  • Sxr2250p
  • Wcd9380 Firmware
  • Wcd9380
  • Wcd9385 Firmware
  • Wcd9385
  • Wcd9390 Firmware
  • Wcd9390
  • Wcd9395 Firmware
  • Wcd9395
  • Wsa8830 Firmware
  • Wsa8830
  • Wsa8832 Firmware
  • Wsa8832
  • Wsa8835 Firmware
  • Wsa8835
  • Wsa8840 Firmware
  • Wsa8840
  • Wsa8845 Firmware
  • Wsa8845
  • Wsa8845h Firmware
  • Wsa8845h
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-416
Use After Free
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
o qualcomm fastconnect_6900_firmware - / / / / / / /
h qualcomm fastconnect_6900 - / / / / / / /
o qualcomm fastconnect_7800_firmware - / / / / / / /
h qualcomm fastconnect_7800 - / / / / / / /
o qualcomm qam8295p_firmware - / / / / / / /
h qualcomm qam8295p - / / / / / / /
o qualcomm qca6574au_firmware - / / / / / / /
h qualcomm qca6574au - / / / / / / /
o qualcomm qca6696_firmware - / / / / / / /
h qualcomm qca6696 - / / / / / / /
o qualcomm qcm8550_firmware - / / / / / / /
h qualcomm qcm8550 - / / / / / / /
o qualcomm qcs6490_firmware - / / / / / / /
h qualcomm qcs6490 - / / / / / / /
o qualcomm qcs8550_firmware - / / / / / / /
h qualcomm qcs8550 - / / / / / / /
o qualcomm video_collaboration_vc3_firmware - / / / / / / /
h qualcomm video_collaboration_vc3 - / / / / / / /
o qualcomm sa6145p_firmware - / / / / / / /
h qualcomm sa6145p - / / / / / / /
o qualcomm sa6150p_firmware - / / / / / / /
h qualcomm sa6150p - / / / / / / /
o qualcomm sa6155p_firmware - / / / / / / /
h qualcomm sa6155p - / / / / / / /
o qualcomm sa8145p_firmware - / / / / / / /
h qualcomm sa8145p - / / / / / / /
o qualcomm sa8150p_firmware - / / / / / / /
h qualcomm sa8150p - / / / / / / /
o qualcomm sa8155p_firmware - / / / / / / /
h qualcomm sa8155p - / / / / / / /
o qualcomm sa8195p_firmware - / / / / / / /
h qualcomm sa8195p - / / / / / / /
o qualcomm sa8295p_firmware - / / / / / / /
h qualcomm sa8295p - / / / / / / /
o qualcomm sd_8_gen1_5g_firmware - / / / / / / /
h qualcomm sd_8_gen1_5g - / / / / / / /
o qualcomm sg8275p_firmware - / / / / / / /
h qualcomm sg8275p - / / / / / / /
o qualcomm sm8550p_firmware - / / / / / / /
h qualcomm sm8550p - / / / / / / /
o qualcomm snapdragon_8_gen_2_mobile_firmware - / / / / / / /
h qualcomm snapdragon_8_gen_2_mobile - / / / / / / /
o qualcomm snapdragon_8_gen_3_mobile_firmware - / / / / / / /
h qualcomm snapdragon_8_gen_3_mobile - / / / / / / /
o qualcomm snapdragon_8\+_gen_2_mobile_firmware - / / / / / / /
h qualcomm snapdragon_8\+_gen_2_mobile - / / / / / / /
o qualcomm snapdragon_ar2_gen_1_firmware - / / / / / / /
h qualcomm snapdragon_ar2_gen_1 - / / / / / / /
o qualcomm ssg2115p_firmware - / / / / / / /
h qualcomm ssg2115p - / / / / / / /
o qualcomm ssg2125p_firmware - / / / / / / /
h qualcomm ssg2125p - / / / / / / /
o qualcomm sxr1230p_firmware - / / / / / / /
h qualcomm sxr1230p - / / / / / / /
o qualcomm sxr2230p_firmware - / / / / / / /
h qualcomm sxr2230p - / / / / / / /
o qualcomm sxr2250p_firmware - / / / / / / /
h qualcomm sxr2250p - / / / / / / /
o qualcomm wcd9380_firmware - / / / / / / /
h qualcomm wcd9380 - / / / / / / /
o qualcomm wcd9385_firmware - / / / / / / /
h qualcomm wcd9385 - / / / / / / /
o qualcomm wcd9390_firmware - / / / / / / /
h qualcomm wcd9390 - / / / / / / /
o qualcomm wcd9395_firmware - / / / / / / /
h qualcomm wcd9395 - / / / / / / /
o qualcomm wsa8830_firmware - / / / / / / /
h qualcomm wsa8830 - / / / / / / /
o qualcomm wsa8832_firmware - / / / / / / /
h qualcomm wsa8832 - / / / / / / /
o qualcomm wsa8835_firmware - / / / / / / /
h qualcomm wsa8835 - / / / / / / /
o qualcomm wsa8840_firmware - / / / / / / /
h qualcomm wsa8840 - / / / / / / /
o qualcomm wsa8845_firmware - / / / / / / /
h qualcomm wsa8845 - / / / / / / /
o qualcomm wsa8845h_firmware - / / / / / / /
h qualcomm wsa8845h - / / / / / / /

CVSS Score

6.7 / 10

CVSS Data - 3.1

  • Attack Vector: LOCAL
  • Attack Complexity: LOW
  • Privileges Required: HIGH
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

    View Vector String

Timeline

Published: Jan. 6, 2025, 11:15 a.m.
Last Modified: Jan. 10, 2025, 5:01 p.m.

Status : Analyzed

CVE has had analysis completed and all data associations made.

More info

Source

product-security@qualcomm.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.