Qualcomm Encourages Original Equipment Manufacturers to Fix Crucial DSP and WLAN Vulnerabilities Amid Ongoing Exploits

Oct 08, 2024Ravie LakshmananMobile Security / Privacy

Qualcomm has released security patches to fix almost twenty flaws encompassing exclusive and open-source elements, including one that is actively being exploited in the wild.

Qualcomm Urges OEMs to Patch Critical DSP and WLAN Flaws Amid Active Exploits

Oct 08, 2024Ravie LakshmananMobile Security / Privacy

Qualcomm Urges OEMs to Patch Critical DSP and WLAN Flaws Amid Active Exploits

Qualcomm has released security patches to fix almost twenty flaws encompassing exclusive and open-source elements, including one that is actively being exploited in the wild.

The significant vulnerability, identified as CVE-2024-43047 (CVSS score: 7.8), has been labeled as a user-after-free glitch in the Digital Signal Processor (DSP) Service, which could induce “memory corruption during the memory mapping of HLOS memory.”

Qualcomm recognized Google Project Zero researcher Seth Jenkins and Conghui Wang for disclosing the flaw, with Amnesty International Security Lab confirming the exploitation in real-world scenarios.

“Google Threat Analysis Group provided indications that CVE-2024-43047 might be subject to targeted exploitation,” the chipmaker stated in a bulletin.

“Remedies for the problem affecting the FASTRPC driver have been issued to OEMs along with a strong suggestion to apply the update on impacted devices without delay.”

Cybersecurity

The full extent of the attacks and their consequences remains unknown currently, although there is a possibility that it might have been utilized in espionage operations targeting members of civil society.

The October update also deals with a critical flaw in the WLAN Resource Manager (CVE-2024-33066, CVSS score: 9.8) resulting from inaccurate input validation, potentially leading to memory corruption.

This development coincides with Google’s publication of its monthly Android security bulletin, addressing 28 vulnerabilities, some of which are related to components from Imagination Technologies, MediaTek, and Qualcomm.

Found this article intriguing? Connect with us on Twitter and LinkedIn for more exclusive content that we share.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.