CVE-2024-45569
Published: 03 February 2025
Summary
CVE-2024-45569 is a critical-severity Improper Validation of Array Index (CWE-129) vulnerability in Qualcomm Ar8035 Firmware. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked in the top 36.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 requires validation of information inputs like ML IE frames to prevent improper array index handling and memory corruption from invalid content.
SI-16 implements memory safeguards such as address space layout randomization or data execution prevention to mitigate exploitation of memory corruption vulnerabilities.
SI-2 ensures timely identification, reporting, and patching of flaws like CVE-2024-45569 as detailed in Qualcomm's security bulletin.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Memory corruption vulnerability in parsing malformed ML IE in wireless frames enables remote exploitation for privilege escalation (e.g., kernel/driver RCE) or endpoint denial of service via application/system crash.
MITRE ATLAS TechniquesAI
MITRE ATLAS techniques
NVD Description
Memory corruption while parsing the ML IE due to invalid frame content.
Deeper analysisAI
CVE-2024-45569 is a memory corruption vulnerability stemming from improper validation of array index (CWE-129) while parsing the ML IE due to invalid frame content. It affects components in Qualcomm products, as documented in the vendor's February 2025 security bulletin.
The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating it is exploitable over the network by unauthenticated attackers requiring low complexity and no user interaction. Successful exploitation could result in high impacts to confidentiality, integrity, and availability, such as arbitrary code execution or system compromise.
Qualcomm's February 2025 security bulletin at https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html details affected products and provides guidance on patches or mitigations. Security practitioners should consult this advisory for specific remediation steps.
Details
- CWE(s)