CVE-2024-43061
Published: 03 March 2025
Summary
CVE-2024-43061 is a high-severity Use After Free (CWE-416) vulnerability in Qualcomm Fastconnect 6900 Firmware. Its CVSS base score is 7.8 (High).
Operationally, ranked at the 29.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Implements security safeguards to protect system memory from unauthorized code execution, directly preventing exploitation of the use-after-free memory corruption during voice activation.
Requires identification, reporting, and correction of the specific use-after-free flaw in Qualcomm components via vendor patches from the March 2025 security bulletin.
Validates information inputs such as sound model lists from HLOS to prevent processing empty lists that trigger memory corruption.
NVD Description
Memory corruption during voice activation, when sound model parameters are loaded from HLOS, and the received sound model list is empty in HLOS drive.
Deeper analysisAI
CVE-2024-43061 is a memory corruption vulnerability stemming from a use-after-free condition (CWE-416) that occurs during voice activation in Qualcomm components. Specifically, it arises when sound model parameters are loaded from the High-Level Operating System (HLOS), and the received sound model list is empty in the HLOS driver. The vulnerability carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity with potential for significant impact on confidentiality, integrity, and availability.
A local attacker with low privileges can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation could allow the attacker to trigger memory corruption, potentially leading to arbitrary code execution, data tampering, or denial of service within the affected component.
Qualcomm's March 2025 security bulletin details the affected products, exploitation status, and available patches or mitigations at https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2025-bulletin.html. Security practitioners should consult this advisory for vendor-specific remediation guidance.
Details
- CWE(s)