Security

Patches

Qualcomm urges device makers to push patches after 'targeted' exploitation

Given Amnesty's involvement, it's a safe bet spyware is in play


Qualcomm has issued 20 patches for its chipsets' firmware, including one Digital Signal Processor (DSP) software flaw that has been exploited in the wild.

That vulnerability, CVE-2024-43047, carries a CVSS 7.8-out-of-10 severity rating, and was notably reported by both Google's Project Zero team and Amnesty International's code testers. The involvement of the latter indicates this bug has been exploited by either nation-state attackers or commercial surveillanceware vendors, or both.

"There are indications from Google Threat Analysis Group that CVE-2024-43047 may be under limited, targeted exploitation," Qualcomm said in its advisory for the updates. "Patches for the issue affecting the FASTRPC driver have been made available to OEMs together with a strong recommendation to deploy the update on affected devices as soon as possible."

Ie, those device makers need to push these fixes out to people's gadgets ASAP. Look out for updates to install and apply them.

So far, the CVE-2024-43047 flaw affects Snapdragon 660 and newer models, Qualcomm's 5G modems, and FastConnect 6700, 6800, 6900, and 7800 Wi-Fi/Bluetooth kit.

Of the other 19 flaws, there's CVE-2024-33066, a critical improper input validation issue with the WLAN resource manager which has a CVSS score of 9.8. Luckily so far, to our knowledge, this hasn't been exploited yet.

Qualcomm also warned of two other high-severity vulnerabilities - CVE-2024-23369 and CVE-2024-33065. The latter, rated CVSS 8.4, involves memory corruption in the camera driver. Meanwhile, the former is a similar memory flaw, affecting the device's high-level operating system. The chipmaker also released two other patches for medium-severity bugs.

The remaining 14 patches comprise nine high-severity and five medium bugs. Seven cover WLAN operations, three fix issues in the DSP service, and there's a grab-bag of other code improvements - although some of them were noted around a year ago and are only now being fixed.

Qualcomm got its announcement out early today, and we're still waiting to see what Patch Tuesday will bring from Microsoft and others. ®

Send us news
Post a comment

Intel’s datacenter architecture boss and Xeon lead jumps to Qualcomm

Sailesh Kottapalli sees ‘a once-in-a-career opportunity’ at the house of Snapdragon – maybe server CPUs or AI silicon?

Qualcomm’s latest Snapdragon X chip targets $600 Copilot+ PCs

Hopes to elbow out competition on Arm-based hardware

Mitel 0-day, 5-year-old Oracle RCE bug under active exploit

3 CVEs added to CISA's catalog

How to leave the submarine cable cutters all at sea – go Swedish

Clear rules and guaranteed consequences concentrate the mind wonderfully. Just ask a Russian

RISC-V is making moves, but it has work to do if it wants to hit the mainstream

Can it topple x86 and Arm, or is the gap too wide to close?

Jury spares Qualcomm's AI PC ambitions, but Arm eyes a retrial

The victory may be short lived as the chip designer gears up for second round

'That's not a bug, it's a feature' takes on a darker tone when malware's involved

Mummy, where do zero days come from?

Jury trial kicks off Arm's wrestling match with Qualcomm

The Nuvia buyer's alleged violations of license terms expected to last through Friday

Critical security hole in Apache Struts under exploit

You applied the patch that could stop possible RCE attacks last week, right?

Badass Russian techie outsmarts FSB, flees Putinland all while being tracked with spyware

Threatened with life in prison, Kyiv charity worker gives middle finger to state spies

Qualcomm's Windows on Arm push would be great – if only it ran all your software

Until compatibility issues are properly addressed, it'll never stand up to x86

Zabbix urges upgrades after critical SQL injection bug disclosure

US agencies blasted 'unforgivable' SQLi flaws earlier this year