Cyber Posture

CVE-2024-33059

Medium

Published: 06 January 2025

Published
06 January 2025
Modified
10 January 2025
KEV Added
Patch
CVSS Score 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0006 20.2th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-33059 is a medium-severity Use After Free (CWE-416) vulnerability in Qualcomm Fastconnect 6900 Firmware. Its CVSS base score is 6.7 (Medium).

Operationally, ranked at the 20.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Provides memory protections such as address space layout randomization and page permissions that directly mitigate use-after-free vulnerabilities during IOCTL processing.

prevent

Mandates timely remediation of identified flaws like this memory corruption vulnerability through vendor patches recommended in Qualcomm's bulletin.

prevent

Enforces validation of IOCTL inputs such as frame commands to prevent malformed data from triggering the use-after-free memory corruption.

NVD Description

Memory corruption while processing frame command IOCTL calls.

Deeper analysisAI

CVE-2024-33059 is a memory corruption vulnerability classified under CWE-416 (Use After Free) that occurs while processing frame command IOCTL calls in Qualcomm components. Published on January 6, 2025, it carries a CVSS v3.1 base score of 6.7, reflecting a local attack vector with low attack complexity.

A local attacker with high privileges (PR:H) can exploit this vulnerability without user interaction through low-complexity means. Successful exploitation enables high-impact consequences, including unauthorized access to confidential data (C:H), modification of system integrity (I:H), and denial of service or system disruption (A:H), potentially via arbitrary code execution resulting from the memory corruption.

Qualcomm's January 2025 security bulletin, available at https://docs.qualcomm.com/product/publicresources/securitybulletin/january-2025-bulletin.html, details affected products and recommends applying vendor-provided patches for mitigation.

Details

CWE(s)

Affected Products

qualcomm
fastconnect 6900 firmware
all versions
qualcomm
fastconnect 7800 firmware
all versions
qualcomm
qcm8550 firmware
all versions
qualcomm
qcs8550 firmware
all versions
qualcomm
sg8275p firmware
all versions
qualcomm
sm8550p firmware
all versions
qualcomm
snapdragon 8 gen 2 mobile firmware
all versions
qualcomm
snapdragon 8 gen 3 mobile firmware
all versions
qualcomm
snapdragon 8\+ gen 2 mobile firmware
all versions
qualcomm
wcd9380 firmware
all versions
+6 more product configuration(s) — see NVD for full list

CVEs Like This One

CVE-2024-38411Same product: Qualcomm Fastconnect 6900
CVE-2024-38412Same product: Qualcomm Fastconnect 7800
CVE-2024-33055Same product: Qualcomm Fastconnect 6900
CVE-2025-47358Same product: Qualcomm Fastconnect 6900
CVE-2026-21380Same product: Qualcomm Fastconnect 6900
CVE-2024-45580Same product: Qualcomm Fastconnect 6900
CVE-2024-43062Same product: Qualcomm Fastconnect 6900
CVE-2025-47359Same product: Qualcomm Fastconnect 6900
CVE-2024-53023Same product: Qualcomm Fastconnect 6900
CVE-2024-43059Same product: Qualcomm Fastconnect 6900

References