Article Details
Scrape Timestamp (UTC): 2024-10-08 21:33:59.246
Source: https://www.theregister.com/2024/10/08/qualcomm_patch_spyware/
Original Article Text
Click to Toggle View
Qualcomm urges device makers to push patches after 'targeted' exploitation. Given Amnesty's involvement, it's a safe bet spyware is in play. Qualcomm has issued 20 patches for its chipsets' firmware, including one Digital Signal Processor (DSP) software flaw that has been exploited in the wild. That vulnerability, CVE-2024-43047, carries a CVSS 7.8-out-of-10 severity rating, and was notably reported by both Google's Project Zero team and Amnesty International's code testers. The involvement of the latter indicates this bug has been exploited by either nation-state attackers or commercial surveillanceware vendors, or both. "There are indications from Google Threat Analysis Group that CVE-2024-43047 may be under limited, targeted exploitation," Qualcomm said in its advisory for the updates. "Patches for the issue affecting the FASTRPC driver have been made available to OEMs together with a strong recommendation to deploy the update on affected devices as soon as possible." Ie, those device makers need to push these fixes out to people's gadgets ASAP. Look out for updates to install and apply them. So far, the CVE-2024-43047 flaw affects Snapdragon 660 and newer models, Qualcomm's 5G modems, and FastConnect 6700, 6800, 6900, and 7800 Wi-Fi/Bluetooth kit. Of the other 19 flaws, there's CVE-2024-33066, a critical improper input validation issue with the WLAN resource manager which has a CVSS score of 9.8. Luckily so far, to our knowledge, this hasn't been exploited yet. Qualcomm also warned of two other high-severity vulnerabilities - CVE-2024-23369 and CVE-2024-33065. The latter, rated CVSS 8.4, involves memory corruption in the camera driver. Meanwhile, the former is a similar memory flaw, affecting the device's high-level operating system. The chipmaker also released two other patches for medium-severity bugs. The remaining 14 patches comprise nine high-severity and five medium bugs. Seven cover WLAN operations, three fix issues in the DSP service, and there's a grab-bag of other code improvements - although some of them were noted around a year ago and are only now being fixed. Qualcomm got its announcement out early today, and we're still waiting to see what Patch Tuesday will bring from Microsoft and others.
Daily Brief Summary
Qualcomm has released 20 patches for its chipset firmware, including fixes for a dangerous exploit in its Digital Signal Processor (DSP) software.
The critical vulnerability, known as CVE-2024-43047 with a CVSS score of 7.8, has been exploited in the wild, prompting urgent updates from Qualcomm.
Both Google’s Project Zero and Amnesty International have reported on this issue, suggesting involvement of nation-state attackers or commercial surveillance vendors.
Qualcomm's advisory highlighted targeted exploitation signs necessitating OEMs to expedite update rollout to affected devices like Snapdragon-powered models and 5G modems.
Another severe flaw, identified as CVE-2024-33066 in WLAN resource management, scores a 9.8 on the CVSS but has not yet been exploited.
Other vulnerabilities resolved include an 8.4-rated memory corruption issue in the camera driver and various other medium and high-severity bugs.
Qualcomm prioritizes patches for numerous high-impact issues, including additional protections for WLAN operations and DSP services.
Device users are advised to look for updates and install them promptly to protect against potential security breaches.