CVE-2024-45555
06.01.2025, 11:15
Memory corruption can occur if an already verified IFS2 image is overwritten, bypassing boot verification. This allows unauthorized programs to be injected into security-sensitive images, enabling the booting of a tampered IFS2 system image.Enginsight
Vendor | Product | Version |
---|---|---|
qualcomm | msm8996au_firmware | - |
qualcomm | qam8255p_firmware | - |
qualcomm | qam8295p_firmware | - |
qualcomm | qam8620p_firmware | - |
qualcomm | qam8650p_firmware | - |
qualcomm | qam8775p_firmware | - |
qualcomm | qamsrv1h_firmware | - |
qualcomm | qamsrv1m_firmware | - |
qualcomm | qca6564a_firmware | - |
qualcomm | qca6564au_firmware | - |
qualcomm | qca6574a_firmware | - |
qualcomm | qca6574au_firmware | - |
qualcomm | qca6584au_firmware | - |
qualcomm | qca6595_firmware | - |
qualcomm | qca6595au_firmware | - |
qualcomm | qca6688aq_firmware | - |
qualcomm | qca6696_firmware | - |
qualcomm | qca6698aq_firmware | - |
qualcomm | sa6145p_firmware | - |
qualcomm | sa6150p_firmware | - |
qualcomm | sa6155_firmware | - |
qualcomm | sa6155p_firmware | - |
qualcomm | sa7255p_firmware | - |
qualcomm | sa7775p_firmware | - |
qualcomm | sa8145p_firmware | - |
qualcomm | sa8150p_firmware | - |
qualcomm | sa8155_firmware | - |
qualcomm | sa8155p_firmware | - |
qualcomm | sa8195p_firmware | - |
qualcomm | sa8255p_firmware | - |
qualcomm | sa8295p_firmware | - |
qualcomm | sa8540p_firmware | - |
qualcomm | sa8620p_firmware | - |
qualcomm | sa8650p_firmware | - |
qualcomm | sa8770p_firmware | - |
qualcomm | sa8775p_firmware | - |
qualcomm | sa9000p_firmware | - |
qualcomm | snapdragon_820_automotive_firmware | - |
qualcomm | srv1h_firmware | - |
qualcomm | srv1l_firmware | - |
qualcomm | srv1m_firmware | - |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-787 - Out-of-bounds WriteThe software writes data past the end, or before the beginning, of the intended buffer.
- CWE-190 - Integer Overflow or WraparoundThe software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.