Cyber Posture

CVE-2024-49843

High

Published: 03 February 2025

Published
03 February 2025
Modified
05 February 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0011 29.3th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-49843 is a high-severity Improper Validation of Array Index (CWE-129) vulnerability in Qualcomm Fastconnect 6200 Firmware. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 29.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the improper validation of array index in IOCTL parameters from user space, preventing memory corruption.

prevent

Implements memory protections that mitigate unauthorized memory access and code execution resulting from the array index out-of-bounds vulnerability.

prevent

Ensures timely identification, reporting, and patching of the specific memory corruption flaw as recommended in the vendor bulletin.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local memory corruption in kernel driver (IOCTL) directly enables privilege escalation via crafted input leading to arbitrary code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Memory corruption while processing IOCTL from user space to handle GPU AHB bus error.

Deeper analysisAI

CVE-2024-49843 is a memory corruption vulnerability stemming from improper validation of array index (CWE-129) during the processing of IOCTL calls from user space intended to handle GPU AHB bus errors. It affects Qualcomm components, as detailed in the vendor's security bulletin.

The vulnerability carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating exploitation requires local access with low privileges and low complexity, with no user interaction needed. A malicious local user could send a crafted IOCTL request, triggering memory corruption that enables high-impact compromise of confidentiality, integrity, and availability, such as arbitrary code execution or system crashes.

Qualcomm's February 2025 security bulletin at https://docs.qualcomm.com/product/publicresources/securitybulletin/february-2025-bulletin.html outlines affected products and recommends applying vendor-provided patches for mitigation.

Details

CWE(s)

Affected Products

qualcomm
fastconnect 6200 firmware
all versions
qualcomm
fastconnect 7800 firmware
all versions
qualcomm
qca6391 firmware
all versions
qualcomm
qcm6125 firmware
all versions
qualcomm
qcs6125 firmware
all versions
qualcomm
qcs7230 firmware
all versions
qualcomm
qcs8250 firmware
all versions
qualcomm
video collaboration vc1 platform firmware
all versions
qualcomm
video collaboration vc5 platform firmware
all versions
qualcomm
sm4635 firmware
all versions
+42 more product configuration(s) — see NVD for full list

CVEs Like This One

CVE-2024-49833Same product: Qualcomm Fastconnect 7800
CVE-2024-49834Same product: Qualcomm Fastconnect 6200
CVE-2024-49836Same product: Qualcomm Fastconnect 7800
CVE-2024-49832Same product: Qualcomm Fastconnect 7800
CVE-2024-53014Same product: Qualcomm Fastconnect 6200
CVE-2024-49837Same vendor: Qualcomm
CVE-2025-47393Same vendor: Qualcomm
CVE-2025-47388Same product: Qualcomm Fastconnect 6200
CVE-2025-47394Same product: Qualcomm Fastconnect 6200
CVE-2025-47396Same product: Qualcomm Fastconnect 6200

References