CVE-2024-38410

Nov. 7, 2024, 7:41 p.m.

7.8
High

Description

Memory corruption while IOCLT is called when device is in invalid state and the WMI command buffer may be freed twice.

Product(s) Impacted

Vendor Product Versions
Qualcomm
  • Wsa8845h Firmware
  • Wsa8845h
  • Wsa8845 Firmware
  • Wsa8845
  • Wsa8840 Firmware
  • Wsa8840
  • Wsa8835 Firmware
  • Wsa8835
  • Wsa8830 Firmware
  • Wsa8830
  • Wcn3660b Firmware
  • Wcn3660b
  • Wcn3620 Firmware
  • Wcn3620
  • Wcd9385 Firmware
  • Wcd9385
  • Wcd9380 Firmware
  • Wcd9380
  • Wcd9375 Firmware
  • Wcd9375
  • Wcd9370 Firmware
  • Wcd9370
  • Snapdragon 8cx Gen 3 Compute Platform Firmware
  • Snapdragon 8cx Gen 3 Compute Platform
  • Snapdragon 429 Mobile Platform Firmware
  • Snapdragon 429 Mobile Platform
  • Sdm429w Firmware
  • Sdm429w
  • Sc8380xp Firmware
  • Sc8380xp
  • Video Collaboration Vc3 Platform Firmware
  • Video Collaboration Vc3 Platform
  • Qcs6490 Firmware
  • Qcs6490
  • Qcs5430 Firmware
  • Qcs5430
  • Qcm6490 Firmware
  • Qcm6490
  • Qcm5430 Firmware
  • Qcm5430
  • Qcc2076 Firmware
  • Qcc2076
  • Qcc2073 Firmware
  • Qcc2073
  • Fastconnect 7800 Firmware
  • Fastconnect 7800
  • Fastconnect 6900 Firmware
  • Fastconnect 6900
  • Fastconnect 6700 Firmware
  • Fastconnect 6700
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-121
Stack-based Buffer Overflow
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
CWE-787
Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
o qualcomm wsa8845h_firmware - / / / / / / /
h qualcomm wsa8845h - / / / / / / /
o qualcomm wsa8845_firmware - / / / / / / /
h qualcomm wsa8845 - / / / / / / /
o qualcomm wsa8840_firmware - / / / / / / /
h qualcomm wsa8840 - / / / / / / /
o qualcomm wsa8835_firmware - / / / / / / /
h qualcomm wsa8835 - / / / / / / /
o qualcomm wsa8830_firmware - / / / / / / /
h qualcomm wsa8830 - / / / / / / /
o qualcomm wcn3660b_firmware - / / / / / / /
h qualcomm wcn3660b - / / / / / / /
o qualcomm wcn3620_firmware - / / / / / / /
h qualcomm wcn3620 - / / / / / / /
o qualcomm wcd9385_firmware - / / / / / / /
h qualcomm wcd9385 - / / / / / / /
o qualcomm wcd9380_firmware - / / / / / / /
h qualcomm wcd9380 - / / / / / / /
o qualcomm wcd9375_firmware - / / / / / / /
h qualcomm wcd9375 - / / / / / / /
o qualcomm wcd9370_firmware - / / / / / / /
h qualcomm wcd9370 - / / / / / / /
o qualcomm snapdragon_8cx_gen_3_compute_platform_firmware - / / / / / / /
h qualcomm snapdragon_8cx_gen_3_compute_platform - / / / / / / /
o qualcomm snapdragon_429_mobile_platform_firmware - / / / / / / /
h qualcomm snapdragon_429_mobile_platform - / / / / / / /
o qualcomm sdm429w_firmware - / / / / / / /
h qualcomm sdm429w - / / / / / / /
o qualcomm sc8380xp_firmware - / / / / / / /
h qualcomm sc8380xp - / / / / / / /
o qualcomm video_collaboration_vc3_platform_firmware - / / / / / / /
h qualcomm video_collaboration_vc3_platform - / / / / / / /
o qualcomm qcs6490_firmware - / / / / / / /
h qualcomm qcs6490 - / / / / / / /
o qualcomm qcs5430_firmware - / / / / / / /
h qualcomm qcs5430 - / / / / / / /
o qualcomm qcm6490_firmware - / / / / / / /
h qualcomm qcm6490 - / / / / / / /
o qualcomm qcm5430_firmware - / / / / / / /
h qualcomm qcm5430 - / / / / / / /
o qualcomm qcc2076_firmware - / / / / / / /
h qualcomm qcc2076 - / / / / / / /
o qualcomm qcc2073_firmware - / / / / / / /
h qualcomm qcc2073 - / / / / / / /
o qualcomm fastconnect_7800_firmware - / / / / / / /
h qualcomm fastconnect_7800 - / / / / / / /
o qualcomm fastconnect_6900_firmware - / / / / / / /
h qualcomm fastconnect_6900 - / / / / / / /
o qualcomm fastconnect_6700_firmware - / / / / / / /
h qualcomm fastconnect_6700 - / / / / / / /

CVSS Score

7.8 / 10

CVSS Data - 3.1

  • Attack Vector: LOCAL
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

    View Vector String

Timeline

Published: Nov. 4, 2024, 10:15 a.m.
Last Modified: Nov. 7, 2024, 7:41 p.m.

Status : Analyzed

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

product-security@qualcomm.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.