CVE-2024-43049

Dec. 12, 2024, 3:28 p.m.

7.8
High

Description

Memory corruption while invoking IOCTL calls from user space to set generic private command inside WLAN driver.

Product(s) Impacted

Vendor Product Versions
Qualcomm
  • Fastconnect 6700 Firmware
  • Fastconnect 6700
  • Fastconnect 6900 Firmware
  • Fastconnect 6900
  • Fastconnect 7800 Firmware
  • Fastconnect 7800
  • Qcc2073 Firmware
  • Qcc2073
  • Qcc2076 Firmware
  • Qcc2076
  • Sc8380xp Firmware
  • Sc8380xp
  • Sdm429w Firmware
  • Sdm429w
  • Snapdragon 429 Mobile Platform Firmware
  • Snapdragon 429 Mobile Platform
  • Snapdragon 7c\+ Gen 3 Compute Firmware
  • Snapdragon 7c\+ Gen 3 Compute
  • Snapdragon 8cx Gen 3 Compute Platform Firmware
  • Snapdragon 8cx Gen 3 Compute Platform
  • Wcd9380 Firmware
  • Wcd9380
  • Wcd9385 Firmware
  • Wcd9385
  • Wcn3620 Firmware
  • Wcn3620
  • Wcn3660b Firmware
  • Wcn3660b
  • Wsa8830 Firmware
  • Wsa8830
  • Wsa8835 Firmware
  • Wsa8835
  • Wsa8840 Firmware
  • Wsa8840
  • Wsa8845 Firmware
  • Wsa8845
  • Wsa8845h Firmware
  • Wsa8845h
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
CWE-787
Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
o qualcomm fastconnect_6700_firmware - / / / / / / /
h qualcomm fastconnect_6700 - / / / / / / /
o qualcomm fastconnect_6900_firmware - / / / / / / /
h qualcomm fastconnect_6900 - / / / / / / /
o qualcomm fastconnect_7800_firmware - / / / / / / /
h qualcomm fastconnect_7800 - / / / / / / /
o qualcomm qcc2073_firmware - / / / / / / /
h qualcomm qcc2073 - / / / / / / /
o qualcomm qcc2076_firmware - / / / / / / /
h qualcomm qcc2076 - / / / / / / /
o qualcomm sc8380xp_firmware - / / / / / / /
h qualcomm sc8380xp - / / / / / / /
o qualcomm sdm429w_firmware - / / / / / / /
h qualcomm sdm429w - / / / / / / /
o qualcomm snapdragon_429_mobile_platform_firmware - / / / / / / /
h qualcomm snapdragon_429_mobile_platform - / / / / / / /
o qualcomm snapdragon_7c\+_gen_3_compute_firmware - / / / / / / /
h qualcomm snapdragon_7c\+_gen_3_compute - / / / / / / /
o qualcomm snapdragon_8cx_gen_3_compute_platform_firmware - / / / / / / /
h qualcomm snapdragon_8cx_gen_3_compute_platform - / / / / / / /
o qualcomm wcd9380_firmware - / / / / / / /
h qualcomm wcd9380 - / / / / / / /
o qualcomm wcd9385_firmware - / / / / / / /
h qualcomm wcd9385 - / / / / / / /
o qualcomm wcn3620_firmware - / / / / / / /
h qualcomm wcn3620 - / / / / / / /
o qualcomm wcn3660b_firmware - / / / / / / /
h qualcomm wcn3660b - / / / / / / /
o qualcomm wsa8830_firmware - / / / / / / /
h qualcomm wsa8830 - / / / / / / /
o qualcomm wsa8835_firmware - / / / / / / /
h qualcomm wsa8835 - / / / / / / /
o qualcomm wsa8840_firmware - / / / / / / /
h qualcomm wsa8840 - / / / / / / /
o qualcomm wsa8845_firmware - / / / / / / /
h qualcomm wsa8845 - / / / / / / /
o qualcomm wsa8845h_firmware - / / / / / / /
h qualcomm wsa8845h - / / / / / / /

CVSS Score

7.8 / 10

CVSS Data - 3.1

  • Attack Vector: LOCAL
  • Attack Complexity: LOW
  • Privileges Required: LOW
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

    View Vector String

Timeline

Published: Dec. 2, 2024, 11:15 a.m.
Last Modified: Dec. 12, 2024, 3:28 p.m.

Status : Analyzed

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

product-security@qualcomm.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.