Cyber Posture

CVE-2024-49833

High

Published: 03 February 2025

Published
03 February 2025
Modified
05 February 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0011 29.3th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-49833 is a high-severity Improper Validation of Array Index (CWE-129) vulnerability in Qualcomm Fastconnect 6700 Firmware. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 29.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of inputs like invalid Camera IDs to prevent memory corruption in the camera component.

prevent

Mandates timely remediation of the identified memory corruption flaw via application of Qualcomm patches.

prevent

Provides comprehensive memory protection mechanisms to mitigate exploitation of memory corruption triggered by invalid CIDs.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local memory corruption in Qualcomm camera component directly enables arbitrary code execution from low-privileged context, mapping to exploitation for privilege escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Memory corruption can occur in the camera when an invalid CID is used.

Deeper analysisAI

CVE-2024-49833 is a memory corruption vulnerability (CWE-129) in the camera component of Qualcomm products, triggered when an invalid Camera ID (CID) is used. It has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high impact on confidentiality, integrity, and availability. The issue stems from improper validation leading to memory corruption.

A local attacker with low privileges, such as a standard user on the affected system, can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation could allow arbitrary code execution, data tampering, or system crashes within the camera subsystem's scope, potentially compromising the device.

Qualcomm has published a security bulletin detailing the vulnerability and associated patches: https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html. Security practitioners should apply the recommended updates from the February 2025 bulletin to mitigate the risk.

Details

CWE(s)

Affected Products

qualcomm
fastconnect 6700 firmware
all versions
qualcomm
fastconnect 6900 firmware
all versions
qualcomm
fastconnect 7800 firmware
all versions
qualcomm
qam8255p firmware
all versions
qualcomm
qam8650p firmware
all versions
qualcomm
qam8775p firmware
all versions
qualcomm
qamsrv1h firmware
all versions
qualcomm
qamsrv1m firmware
all versions
qualcomm
qca6595 firmware
all versions
qualcomm
qca6595au firmware
all versions
+70 more product configuration(s) — see NVD for full list

CVEs Like This One

CVE-2024-49834Same product: Qualcomm Fastconnect 6700
CVE-2024-49843Same product: Qualcomm Fastconnect 7800
CVE-2024-53014Same product: Qualcomm Fastconnect 6700
CVE-2024-49832Same product: Qualcomm Fastconnect 6900
CVE-2024-49836Same product: Qualcomm Fastconnect 6900
CVE-2025-47393Same product: Qualcomm Qam8255P
CVE-2024-49837Same product: Qualcomm Qam8255P
CVE-2024-45569Same product: Qualcomm Fastconnect 6700
CVE-2025-47345Same product: Qualcomm Fastconnect 6700
CVE-2024-53024Same product: Qualcomm Fastconnect 6700

References