Cyber Posture

CVE-2024-49838

High

Published: 03 February 2025

Published
03 February 2025
Modified
05 February 2025
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L
EPSS Score 0.0011 29.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-49838 is a high-severity Buffer Over-read (CWE-126) vulnerability in Qualcomm Ar8035 Firmware. Its CVSS base score is 8.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 29.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents buffer over-reads by validating invalid lengths in OCI IE inputs during parsing.

prevent

Requires timely patching of the specific Qualcomm parsing flaw as documented in the vendor security bulletin.

prevent

Provides memory protections that mitigate information disclosure from out-of-bounds reads in vulnerable components.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Remote network parsing flaw enables unauthenticated exploitation of public-facing Qualcomm components for info disclosure.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Information disclosure while parsing the OCI IE with invalid length.

Deeper analysisAI

CVE-2024-49838 is an information disclosure vulnerability that arises while parsing the OCI IE with an invalid length, associated with CWE-126 (Buffer Over-read) and CWE-125 (Out-of-bounds Read). It carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L), indicating high severity due to significant confidentiality impact. The vulnerability affects components documented in Qualcomm's security advisories.

A remote, unauthenticated attacker can exploit this vulnerability over the network with low attack complexity and no user interaction required. By sending a specially crafted input with an invalid length in the OCI IE, the attacker can trigger the parsing flaw, resulting in disclosure of sensitive information (high confidentiality impact) alongside a low availability impact from potential denial of service.

Qualcomm's February 2025 security bulletin, available at https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html, addresses this CVE with details on affected products and recommended mitigations or patches.

Details

CWE(s)

Affected Products

qualcomm
ar8035 firmware
all versions
qualcomm
fastconnect 6200 firmware
all versions
qualcomm
fastconnect 6700 firmware
all versions
qualcomm
fastconnect 6800 firmware
all versions
qualcomm
fastconnect 6900 firmware
all versions
qualcomm
fastconnect 7800 firmware
all versions
qualcomm
mdm9628 firmware
all versions
qualcomm
qam8255p firmware
all versions
qualcomm
qam8295p firmware
all versions
qualcomm
qam8620p firmware
all versions
+159 more product configuration(s) — see NVD for full list

CVEs Like This One

CVE-2024-49839Same product: Qualcomm Ar8035
CVE-2025-21427Same product: Qualcomm Fastconnect 6200
CVE-2024-45558Same product: Qualcomm Ar8035
CVE-2025-21450Same product: Qualcomm Ar8035
CVE-2024-38404Same product: Qualcomm Ar8035
CVE-2024-45584Same product: Qualcomm Ar8035
CVE-2024-45553Same product: Qualcomm Ar8035
CVE-2025-47366Same product: Qualcomm Ar8035
CVE-2025-59600Same product: Qualcomm Ar8035
CVE-2024-45546Same product: Qualcomm Fastconnect 6900

References