SB2025040754 - Multiple vulnerabilities in Qualcomm chipsets



SB2025040754 - Multiple vulnerabilities in Qualcomm chipsets

Published: April 7, 2025

Security Bulletin ID SB2025040754
Severity
High
Patch available
YES
Number of vulnerabilities 34
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

High 3% Medium 18% Low 79%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 34 secuirty vulnerabilities.


1) Improper Validation of Array Index (CVE-ID: CVE-2025-21447)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Computer Vision. A local application can execute arbitrary code.


2) Improper Access Control (CVE-ID: CVE-2025-21425)

The vulnerability allows a local application to compromise the affected device.

The vulnerability exists due to improper input validation in Automotive Linux OS. A local application can compromise the affected device.


3) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2025-21431)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation in Automotive OS Platform. A local application can gain access to sensitive information.


4) Out-of-bounds read (CVE-ID: CVE-2025-21438)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Windows WLAN Host. A local application can execute arbitrary code.


5) Out-of-bounds write (CVE-ID: CVE-2025-21439)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Windows WLAN Host. A local application can execute arbitrary code.


6) Out-of-bounds write (CVE-ID: CVE-2025-21440)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Windows WLAN Host. A local application can execute arbitrary code.


7) Out-of-bounds write (CVE-ID: CVE-2025-21441)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Windows WLAN Host. A local application can execute arbitrary code.


8) Buffer over-read (CVE-ID: CVE-2025-21448)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.


9) Use of Out-of-range Pointer Offset (CVE-ID: CVE-2024-45557)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Trust Management Engine. A local application can execute arbitrary code.


10) Use After Free (CVE-ID: CVE-2024-43066)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in HLOS. A local application can execute arbitrary code.


11) Buffer over-read (CVE-ID: CVE-2025-21428)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Host. A remote attacker can perform a denial of service (DoS) attack.


12) Buffer over-read (CVE-ID: CVE-2025-21429)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Host. A remote attacker can perform a denial of service (DoS) attack.


13) Buffer over-read (CVE-ID: CVE-2025-21430)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Host. A remote attacker can perform a denial of service (DoS) attack.


14) Use After Free (CVE-ID: CVE-2025-21436)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in DSP Service. A local application can execute arbitrary code.


15) Use After Free (CVE-ID: CVE-2025-21437)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Automotive Linux OS. A local application can execute arbitrary code.


16) Improper Validation of Array Index (CVE-ID: CVE-2025-21423)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Display. A local application can execute arbitrary code.


17) Exposure of Sensitive System Information to an Unauthorized Control Sphere (CVE-ID: CVE-2024-45549)

The vulnerability allows a local application to read and manipulate data.

The vulnerability exists due to improper input validation in KERNEL. A local application can read and manipulate data.


18) Buffer over-read (CVE-ID: CVE-2024-45552)

The vulnerability allows a remote attacker to read and manipulate data.

The vulnerability exists due to improper input validation in Data Network Stack & Connectivity. A remote attacker can read and manipulate data.


19) Information exposure (CVE-ID: CVE-2024-43046)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation in TZ Secure OS. A local application can gain access to sensitive information.


20) Use After Free (CVE-ID: CVE-2024-49848)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to improper input validation in DSP Service. A local privileged application can execute arbitrary code.


21) Buffer over-read (CVE-ID: CVE-2025-21421)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Display. A local application can execute arbitrary code.


22) Buffer over-read (CVE-ID: CVE-2025-21434)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Host. A remote attacker can perform a denial of service (DoS) attack.


23) Type conversion (CVE-ID: CVE-2024-43058)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Multimedia Frameworks. A local application can execute arbitrary code.


24) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2024-43067)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Camera. A local application can execute arbitrary code.


25) Buffer over-read (CVE-ID: CVE-2025-21435)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Host Communication. A remote attacker can perform a denial of service (DoS) attack.


26) Use After Free (CVE-ID: CVE-2024-45540)

The vulnerability allows a local application to read and manipulate data.

The vulnerability exists due to improper input validation in HLOS. A local application can read and manipulate data.


27) Exposed Dangerous Method or Function (CVE-ID: CVE-2024-43065)

The vulnerability allows a local application to read and manipulate data.

The vulnerability exists due to improper input validation in HLOS. A local application can read and manipulate data.


28) Out-of-bounds write (CVE-ID: CVE-2024-45543)

The vulnerability allows a local application to read and manipulate data.

The vulnerability exists due to improper input validation in Audio. A local application can read and manipulate data.


29) Use After Free (CVE-ID: CVE-2024-45544)

The vulnerability allows a local application to read and manipulate data.

The vulnerability exists due to improper input validation in Data Network Stack & Connectivity. A local application can read and manipulate data.


30) Weak Authentication (CVE-ID: CVE-2024-45551)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation in HLOS. A local application can gain access to sensitive information.


31) Improper Access Control for Register Interface (CVE-ID: CVE-2024-45556)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation in TZ Firmware. A local application can gain access to sensitive information.


32) Integer overflow (CVE-ID: CVE-2025-21442)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Automotive Vehicle Networks. A local application can execute arbitrary code.


33) Buffer overflow (CVE-ID: CVE-2025-21443)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Automotive Vehicle Networks. A local application can execute arbitrary code.


34) Insufficient Granularity of Access Control (CVE-ID: CVE-2024-33058)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to improper input validation in Core. A local privileged application can execute arbitrary code.


Remediation

Install update from vendor's website.