CVE-2024-43059
Published: 03 March 2025
Summary
CVE-2024-43059 is a high-severity Use After Free (CWE-416) vulnerability in Qualcomm Sa8770P Firmware. Its CVSS base score is 7.8 (High).
Operationally, ranked at the 29.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Implements memory protection mechanisms such as address space randomization and non-executable memory to directly mitigate memory corruption exploits like use-after-free in HGSL IOCTL handlers.
Enforces validation of user-space inputs to IOCTL calls, preventing improper handling that leads to memory corruption in the HGSL memory node.
Requires timely identification, reporting, and remediation of flaws like CVE-2024-43059 through patches outlined in Qualcomm's security bulletin.
NVD Description
Memory corruption while invoking IOCTL calls from the use-space for HGSL memory node.
Deeper analysisAI
CVE-2024-43059 is a memory corruption vulnerability classified under CWE-416, stemming from improper handling during IOCTL calls invoked from user-space targeting the HGSL memory node. Published on 2025-03-03, it carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and affects Qualcomm components, as outlined in their security advisories.
A local attacker with low privileges can exploit this vulnerability through low-complexity IOCTL invocations without requiring user interaction. Exploitation results in high impacts to confidentiality, integrity, and availability, enabling potential memory corruption that could lead to code execution or denial of service within the affected scope.
Qualcomm's March 2025 security bulletin details mitigation steps, including patches for vulnerable products. Security practitioners should consult the advisory at https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html for specific affected versions and remediation guidance.
Details
- CWE(s)