Cyber Posture

CVE-2024-45560

High

Published: 03 February 2025

Published
03 February 2025
Modified
05 February 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0009 24.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-45560 is a high-severity Time-of-check Time-of-use (TOCTOU) Race Condition (CWE-367) vulnerability in Qualcomm Aqt1000 Firmware. Its CVSS base score is 7.8 (High).

Operationally, ranked at the 24.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of userspace buffers passed to the hardware encoder, preventing memory corruption from unvalidated inputs.

prevent

Implements memory protections such as DEP and ASLR to mitigate exploitation of memory corruption vulnerabilities in hardware encoder operations.

prevent

Ensures timely remediation of the specific flaw in Qualcomm components via patching as detailed in the vendor's February 2025 security bulletin.

NVD Description

Memory corruption while taking a snapshot with hardware encoder due to unvalidated userspace buffer.

Deeper analysisAI

CVE-2024-45560 is a memory corruption vulnerability that occurs while taking a snapshot with a hardware encoder due to an unvalidated userspace buffer. It affects Qualcomm components, as detailed in the vendor's security bulletin. The issue is classified under CWE-367 and carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity with potential for significant impact on confidentiality, integrity, and availability.

A local attacker with low privileges can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation could lead to high-impact outcomes, including unauthorized data access, modification, or system disruption, stemming from the memory corruption triggered by the unvalidated buffer during hardware encoder snapshot operations.

Qualcomm has addressed this issue in their February 2025 security bulletin, available at https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html, which provides details on affected products and recommended patches or mitigations for security practitioners to apply.

Details

CWE(s)

Affected Products

qualcomm
aqt1000 firmware
all versions
qualcomm
fastconnect 6200 firmware
all versions
qualcomm
fastconnect 6700 firmware
all versions
qualcomm
fastconnect 6800 firmware
all versions
qualcomm
fastconnect 6900 firmware
all versions
qualcomm
fastconnect 7800 firmware
all versions
qualcomm
qca6391 firmware
all versions
qualcomm
qca6420 firmware
all versions
qualcomm
qca6430 firmware
all versions
qualcomm
qcm5430 firmware
all versions
+27 more product configuration(s) — see NVD for full list

CVEs Like This One

CVE-2024-45561Same product: Qualcomm Aqt1000
CVE-2024-38418Same product: Qualcomm Fastconnect 6800
CVE-2025-47407Same product: Qualcomm Fastconnect 6200
CVE-2024-45573Same product: Qualcomm Fastconnect 6700
CVE-2024-45542Same product: Qualcomm Aqt1000
CVE-2024-45541Same product: Qualcomm Aqt1000
CVE-2024-53028Same vendor: Qualcomm
CVE-2024-53032Same vendor: Qualcomm
CVE-2025-47359Same product: Qualcomm Aqt1000
CVE-2026-21378Same product: Qualcomm Aqt1000

References