CVE-2024-38418
Published: 03 February 2025
Summary
CVE-2024-38418 is a high-severity Time-of-check Time-of-use (TOCTOU) Race Condition (CWE-367) vulnerability in Qualcomm C-V2X 9150 Firmware. Its CVSS base score is 7.8 (High).
Operationally, ranked at the 27.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-16 implements memory protection mechanisms like address space randomization, non-executable stacks, and bounds checking to directly prevent exploitation of memory corruption during IOCTL memory map parsing.
SI-10 requires rigorous validation of inputs such as memory map information in IOCTL calls to block malformed data that triggers memory corruption.
SI-2 ensures timely identification, prioritization, and application of patches from Qualcomm's security bulletin to remediate the specific memory corruption flaw.
NVD Description
Memory corruption while parsing the memory map info in IOCTL calls.
Deeper analysisAI
CVE-2024-38418 is a memory corruption vulnerability that occurs while parsing memory map information in IOCTL calls. It is associated with CWE-367 (Time-of-check Time-of-use (TOCTOU) Race Condition) and affects Qualcomm products, as documented in their security bulletin. The vulnerability received a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact.
A local attacker with low privileges can exploit this vulnerability through low-complexity attacks requiring no user interaction. Exploitation could grant high-level impacts on confidentiality, integrity, and availability, potentially allowing arbitrary code execution, data tampering, or system denial of service within the affected component.
Qualcomm's February 2025 security bulletin, available at https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html, provides details on affected products and mitigation measures, including patches where applicable. The bulletin was referenced in the CVE publication on 2025-02-03.
Details
- CWE(s)