Article Details

Scrape Timestamp (UTC): 2024-10-08 04:13:23.621

Source: https://thehackernews.com/2024/10/qualcomm-urges-oems-to-patch-critical.html

Original Article Text

Click to Toggle View

Qualcomm Urges OEMs to Patch Critical DSP and WLAN Flaws Amid Active Exploits. Qualcomm has rolled out security updates to address nearly two dozen flaws spanning proprietary and open-source components, including one that has come under active exploitation in the wild. The high-severity vulnerability, tracked as CVE-2024-43047 (CVSS score: 7.8), has been described as a user-after-free bug in the Digital Signal Processor (DSP) Service that could lead to "memory corruption while maintaining memory maps of HLOS memory." Qualcomm credited Google Project Zero researcher Seth Jenkins-Google Project Zero and Conghui Wang for reporting the flaw, and Amnesty International Security Lab for confirming in-the-wild activity. "There are indications from Google Threat Analysis Group that CVE-2024-43047 may be under limited, targeted exploitation," the chipmaker said in an advisory. "Patches for the issue affecting FASTRPC driver have been made available to OEMs together with a strong recommendation to deploy the update on affected devices as soon as possible." The full scope of the attacks and their impact is presently unknown, although it's possible that it may have been weaponized as part of spyware attacks targeting civil society members. October's patch also addresses a critical flaw in the WLAN Resource Manager (CVE-2024-33066, CVSS score: 9.8) that's caused by an improper input validation and could result in memory corruption. The development comes as Google released its own monthly Android security bulletin with fixes for 28 vulnerabilities, which also comprise issues identified in components from Imagination Technologies, MediaTek, and Qualcomm.

Daily Brief Summary

CYBERCRIME // Qualcomm Issues Security Patches for Critical Vulnerabilities

Qualcomm has released updates to fix nearly two dozen security issues across proprietary and open-source components.

A particularly severe vulnerability, identified as CVE-2024-43047, with a user-after-free error in the DSP Service has been actively exploited.

This DSP vulnerability could lead to significant memory corruption issues. Google Project Zero and Amnesty International Security Lab highlighted the exploitation risks.

Qualcomm recommends immediate patching by OEMs for a critical flaw affecting the FASTRPC driver due to its potential use in targeted spyware attacks.

Additionally, a critical vulnerability in the WLAN Resource Manager (CVE-2024-33066) could allow memory corruption due to improper input validation.

The update is part of a broader security effort that includes patches for vulnerabilities from other tech giants like Imagination Technologies and MediaTek, in collaboration with Google's Android security updates.

The full extent of the attacks exploiting these vulnerabilities and their overall impact remains unclear, highlighting the need for rapid compliance with the security updates.