CVE-2024-45560
Published: 03 February 2025
Summary
CVE-2024-45560 is a high-severity Time-of-check Time-of-use (TOCTOU) Race Condition (CWE-367) vulnerability in Qualcomm Aqt1000 Firmware. Its CVSS base score is 7.8 (High).
Operationally, ranked at the 24.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of userspace buffers passed to the hardware encoder, preventing memory corruption from unvalidated inputs.
Implements memory protections such as DEP and ASLR to mitigate exploitation of memory corruption vulnerabilities in hardware encoder operations.
Ensures timely remediation of the specific flaw in Qualcomm components via patching as detailed in the vendor's February 2025 security bulletin.
NVD Description
Memory corruption while taking a snapshot with hardware encoder due to unvalidated userspace buffer.
Deeper analysisAI
CVE-2024-45560 is a memory corruption vulnerability that occurs while taking a snapshot with a hardware encoder due to an unvalidated userspace buffer. It affects Qualcomm components, as detailed in the vendor's security bulletin. The issue is classified under CWE-367 and carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity with potential for significant impact on confidentiality, integrity, and availability.
A local attacker with low privileges can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation could lead to high-impact outcomes, including unauthorized data access, modification, or system disruption, stemming from the memory corruption triggered by the unvalidated buffer during hardware encoder snapshot operations.
Qualcomm has addressed this issue in their February 2025 security bulletin, available at https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html, which provides details on affected products and recommended patches or mitigations for security practitioners to apply.
Details
- CWE(s)