7.8
CWE
416
Advisory Published
CVE Published
Updated

CVE-2019-14024: Use After Free

First published: Mon Jan 06 2020(Updated: )

Possible stack-use-after-scope issue in NFC usecase for card emulation in Snapdragon Auto, Snapdragon Industrial IOT, Snapdragon Mobile in MSM8917, MSM8953, Nicobar, QM215, Rennell, SDM429, SDM439, SDM450, SDM632, SDM670, SDM710, SDM845, SM6150, SM7150, SM8150, SM8250, SXR2130

Credit: product-security@qualcomm.com

Affected SoftwareAffected VersionHow to fix
Android
Qualcomm MSM8917
Qualcomm MSM8917 Firmware
Qualcomm 8953 Firmware
Qualcomm MSM8953 Firmware
Qualcomm Nicobar
Qualcomm Nicobar
Qualcomm 215 Firmware
Qualcomm 215
Qualcomm Rennell
qualcomm Rennell firmware
Qualcomm SDM429W
Qualcomm SD429
qualcomm SDM439 firmware
Qualcomm SDM439 Firmware
Qualcomm SD 450 Firmware
Qualcomm Snapdragon 450
Qualcomm SDM632
Qualcomm SDM632
Qualcomm SD 670 Firmware
Qualcomm SDM670 Firmware
Qualcomm SD710 Firmware
Qualcomm Snapdragon 710
Qualcomm SDA/SDM845 Firmware
Qualcomm Snapdragon 845
qualcomm SM6150P firmware
Qualcomm SM6150P
qualcomm SM7150 firmware
qualcomm SM7150 firmware
Qualcomm SM8150P Firmware
Qualcomm SM8150 Fusion
Qualcomm SM8250
Qualcomm qsm8250
qualcomm SXR2130P firmware
Qualcomm SXR2130

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2019-14024?

    CVE-2019-14024 is classified as a critical vulnerability that could lead to arbitrary code execution.

  • How do I fix CVE-2019-14024?

    To fix CVE-2019-14024, update your device firmware to the latest security patch released by your manufacturer.

  • Which devices are affected by CVE-2019-14024?

    CVE-2019-14024 affects various Qualcomm Snapdragon devices including MSM8917, MSM8953, and SDM845, among others.

  • What types of exploits can be performed using CVE-2019-14024?

    CVE-2019-14024 could allow an attacker to execute arbitrary code on the affected devices via malicious NFC data.

  • Is there a workaround for CVE-2019-14024?

    There is no known workaround for CVE-2019-14024; the primary mitigation is to apply software updates.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203