CVE-2024-48856
Published: 14 January 2025
Summary
CVE-2024-48856 is a critical-severity Out-of-bounds Write (CWE-787) vulnerability in Blackberry Qnx Software Development Platform. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 22.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires organizations to identify, report, and correct flaws like the out-of-bounds write in the PCX image codec through timely patching from the vendor.
Mandates validation of untrusted inputs such as PCX image files to detect and reject malformed data that could trigger the out-of-bounds write vulnerability.
Enforces memory protection mechanisms like address space layout randomization and data execution prevention to mitigate exploitation of the out-of-bounds write for code execution.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated out-of-bounds write enabling RCE/DoS in a network-reachable image codec directly maps to exploitation of a public-facing application.
NVD Description
Out-of-bounds write in the PCX image codec in QNX SDP versions 8.0, 7.1 and 7.0 could allow an unauthenticated attacker to cause a denial-of-service condition or execute code in the context of the process using the image codec.
Deeper analysisAI
CVE-2024-48856 is an out-of-bounds write vulnerability (CWE-787) in the PCX image codec within QNX Software Development Platform (SDP) versions 8.0, 7.1, and 7.0. Published on 2025-01-14, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting its critical severity due to high impacts on confidentiality, integrity, and availability.
An unauthenticated attacker can exploit this vulnerability remotely with low attack complexity and no privileges or user interaction required. Exploitation could result in a denial-of-service condition or arbitrary code execution within the context of the process utilizing the image codec.
The BlackBerry support advisory provides further details on this issue, available at https://support.blackberry.com/pkb/s/article/140334.
Details
- CWE(s)