Cyber Posture

CVE-2024-43055

High

Published: 03 March 2025

Published
03 March 2025
Modified
06 March 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0004 12.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-43055 is a high-severity Classic Buffer Overflow (CWE-120) vulnerability in Qualcomm Fastconnect 6900 Firmware. Its CVSS base score is 7.8 (High).

Operationally, ranked at the 12.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Implements memory safeguards such as address space layout randomization, stack canaries, and data execution prevention to directly mitigate memory corruption from malformed camera IOCTL calls.

prevent

Requires validation of IOCTL parameters for camera use cases to prevent buffer overflows and subsequent memory corruption by local low-privilege attackers.

prevent

Directly addresses the vulnerability by identifying, prioritizing, and applying Qualcomm patches for this specific memory corruption flaw in camera IOCTL processing.

NVD Description

Memory corruption while processing camera use case IOCTL call.

Deeper analysisAI

CVE-2024-43055 is a memory corruption vulnerability (CWE-120) triggered during the processing of camera use case IOCTL calls in Qualcomm components. It carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high potential impact with local access required.

A local attacker possessing low privileges can exploit this issue with low attack complexity and without requiring user interaction. Exploitation enables high confidentiality, integrity, and availability impacts, such as unauthorized data access, modification, or denial of service through memory corruption.

Qualcomm's March 2025 Security Bulletin provides details on affected products, patches, and mitigation guidance; see https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html for implementation steps.

Details

CWE(s)

Affected Products

qualcomm
fastconnect 6900 firmware
all versions
qualcomm
fastconnect 7800 firmware
all versions
qualcomm
sdm429w firmware
all versions
qualcomm
snapdragon 429 firmware
all versions
qualcomm
snapdragon 8 gen 1 firmware
all versions
qualcomm
sxr2230p firmware
all versions
qualcomm
sxr2250p firmware
all versions
qualcomm
wcd9380 firmware
all versions
qualcomm
wcd9385 firmware
all versions
qualcomm
wcn3620 firmware
all versions
+4 more product configuration(s) — see NVD for full list

CVEs Like This One

CVE-2024-43062Same product: Qualcomm Fastconnect 6900
CVE-2024-45547Same product: Qualcomm Fastconnect 6900
CVE-2024-43059Same product: Qualcomm Fastconnect 6900
CVE-2024-21464Same product: Qualcomm Fastconnect 6900
CVE-2026-21382Same product: Qualcomm Fastconnect 6900
CVE-2025-47394Same product: Qualcomm Fastconnect 6900
CVE-2025-47388Same product: Qualcomm Fastconnect 6900
CVE-2024-45541Same product: Qualcomm Fastconnect 6900
CVE-2024-53027Same product: Qualcomm Fastconnect 6900
CVE-2025-47389Same product: Qualcomm Fastconnect 6900

References