First published: Mon Mar 03 2025(Updated: )
Memory corruption while doing Escape call when user provides valid kernel address in the place of valid user buffer address.
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Qualcomm FastConnect 6900 Firmware | ||
Qualcomm Fastconnect 6900 Firmware | ||
All of | ||
Qualcomm FastConnect 7800 Firmware | ||
Qualcomm Fastconnect 7800 Firmware | ||
All of | ||
Qualcomm SC8380XP Firmware | ||
Qualcomm SC8380XP Firmware | ||
All of | ||
Qualcomm WCD9380 | ||
Qualcomm WCD9380 Firmware | ||
All of | ||
Qualcomm WCD9385 | ||
Qualcomm WCD9385 Firmware | ||
All of | ||
Qualcomm WSA8840 Firmware | ||
Qualcomm WSA8840 Firmware | ||
All of | ||
Qualcomm WSA8845H | ||
Qualcomm WSA8845 Firmware | ||
All of | ||
Qualcomm WSA8845 Firmware | ||
Qualcomm WSA8845H Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-53033 has been classified with a high severity due to its potential for memory corruption leading to system instability.
To fix CVE-2024-53033, you should apply the latest firmware updates provided by Qualcomm for your affected device.
CVE-2024-53033 affects Qualcomm FastConnect 6900 and 7800 firmware, as well as various other Qualcomm firmware including SC8380XP, WCD9380, WCD9385, and WSA8845 series.
CVE-2024-53033 can lead to denial of service and unauthorized access due to the memory corruption vulnerability.
Currently, no specific workarounds are recommended for CVE-2024-53033, and updating the firmware is advised for mitigation.