CVE-2024-45556 (GCVE-0-2024-45556)
Vulnerability from cvelistv5
Published
2025-04-07 10:15
Modified
2025-04-07 15:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1262 - Improper Access Control for Register Interface
Summary
Cryptographic issue may arise because the access control configuration permits Linux to read key registers in TCSR.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Qualcomm, Inc. | Snapdragon |
Version: FastConnect 6900 Version: FastConnect 7800 Version: Immersive Home 3210 Platform Version: Immersive Home 326 Platform Version: IPQ5300 Version: IPQ5302 Version: IPQ5312 Version: IPQ5332 Version: IPQ9008 Version: IPQ9048 Version: IPQ9554 Version: IPQ9570 Version: IPQ9574 Version: QCA0000 Version: QCA8075 Version: QCA8081 Version: QCA8082 Version: QCA8084 Version: QCA8085 Version: QCA8386 Version: QCF8000 Version: QCF8000SFP Version: QCF8001 Version: QCN5124 Version: QCN6224 Version: QCN6402 Version: QCN6412 Version: QCN6422 Version: QCN6432 Version: QCN9000 Version: QCN9012 Version: QCN9013 Version: QCN9024 Version: QCN9074 Version: QCN9160 Version: QCN9274 Version: QXM8083 Version: SD 8 Gen1 5G Version: SDM429W Version: SDX65M Version: Snapdragon 429 Mobile Platform Version: Snapdragon AR1 Gen 1 Platform Version: Snapdragon AR1 Gen 1 Platform "Luna1" Version: Snapdragon AR2 Gen 1 Platform Version: Snapdragon Wear 4100+ Platform Version: Snapdragon X65 5G Modem-RF System Version: SSG2115P Version: SSG2125P Version: SXR1230P Version: SXR2230P Version: SXR2250P Version: WCD9380 Version: WCD9385 Version: WCN3620 Version: WCN3660B Version: WCN3680B Version: WCN3980 Version: WSA8830 Version: WSA8832 Version: WSA8835 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45556", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T15:51:44.636784Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T15:51:55.660Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Snapdragon CCW", "Snapdragon Compute", "Snapdragon Wearables", "Snapdragon Wired Infrastructure and Networking" ], "product": "Snapdragon", "vendor": "Qualcomm, Inc.", "versions": [ { "status": "affected", "version": "FastConnect 6900" }, { "status": "affected", "version": "FastConnect 7800" }, { "status": "affected", "version": "Immersive Home 3210 Platform" }, { "status": "affected", "version": "Immersive Home 326 Platform" }, { "status": "affected", "version": "IPQ5300" }, { "status": "affected", "version": "IPQ5302" }, { "status": "affected", "version": "IPQ5312" }, { "status": "affected", "version": "IPQ5332" }, { "status": "affected", "version": "IPQ9008" }, { "status": "affected", "version": "IPQ9048" }, { "status": "affected", "version": "IPQ9554" }, { "status": "affected", "version": "IPQ9570" }, { "status": "affected", "version": "IPQ9574" }, { "status": "affected", "version": "QCA0000" }, { "status": "affected", "version": "QCA8075" }, { "status": "affected", "version": "QCA8081" }, { "status": "affected", "version": "QCA8082" }, { "status": "affected", "version": "QCA8084" }, { "status": "affected", "version": "QCA8085" }, { "status": "affected", "version": "QCA8386" }, { "status": "affected", "version": "QCF8000" }, { "status": "affected", "version": "QCF8000SFP" }, { "status": "affected", "version": "QCF8001" }, { "status": "affected", "version": "QCN5124" }, { "status": "affected", "version": "QCN6224" }, { "status": "affected", "version": "QCN6402" }, { "status": "affected", "version": "QCN6412" }, { "status": "affected", "version": "QCN6422" }, { "status": "affected", "version": "QCN6432" }, { "status": "affected", "version": "QCN9000" }, { "status": "affected", "version": "QCN9012" }, { "status": "affected", "version": "QCN9013" }, { "status": "affected", "version": "QCN9024" }, { "status": "affected", "version": "QCN9074" }, { "status": "affected", "version": "QCN9160" }, { "status": "affected", "version": "QCN9274" }, { "status": "affected", "version": "QXM8083" }, { "status": "affected", "version": "SD 8 Gen1 5G" }, { "status": "affected", "version": "SDM429W" }, { "status": "affected", "version": "SDX65M" }, { "status": "affected", "version": "Snapdragon 429 Mobile Platform" }, { "status": "affected", "version": "Snapdragon AR1 Gen 1 Platform" }, { "status": "affected", "version": "Snapdragon AR1 Gen 1 Platform \"Luna1\"" }, { "status": "affected", "version": "Snapdragon AR2 Gen 1 Platform" }, { "status": "affected", "version": "Snapdragon Wear 4100+ Platform" }, { "status": "affected", "version": "Snapdragon X65 5G Modem-RF System" }, { "status": "affected", "version": "SSG2115P" }, { "status": "affected", "version": "SSG2125P" }, { "status": "affected", "version": "SXR1230P" }, { "status": "affected", "version": "SXR2230P" }, { "status": "affected", "version": "SXR2250P" }, { "status": "affected", "version": "WCD9380" }, { "status": "affected", "version": "WCD9385" }, { "status": "affected", "version": "WCN3620" }, { "status": "affected", "version": "WCN3660B" }, { "status": "affected", "version": "WCN3680B" }, { "status": "affected", "version": "WCN3980" }, { "status": "affected", "version": "WSA8830" }, { "status": "affected", "version": "WSA8832" }, { "status": "affected", "version": "WSA8835" } ] } ], "descriptions": [ { "lang": "en", "value": "Cryptographic issue may arise because the access control configuration permits Linux to read key registers in TCSR." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1262", "description": "CWE-1262: Improper Access Control for Register Interface", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T10:15:47.649Z", "orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "shortName": "qualcomm" }, "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2025-bulletin.html" } ], "title": "Improper Access Control for Register Interface in TZ Firmware" } }, "cveMetadata": { "assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "assignerShortName": "qualcomm", "cveId": "CVE-2024-45556", "datePublished": "2025-04-07T10:15:47.649Z", "dateReserved": "2024-09-02T10:26:15.223Z", "dateUpdated": "2025-04-07T15:51:55.660Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-45556\",\"sourceIdentifier\":\"product-security@qualcomm.com\",\"published\":\"2025-04-07T11:15:49.850\",\"lastModified\":\"2025-04-07T14:17:50.220\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cryptographic issue may arise because the access control configuration permits Linux to read key registers in TCSR.\"},{\"lang\":\"es\",\"value\":\"Puede surgir un problema criptogr\u00e1fico porque la configuraci\u00f3n de control de acceso permite que Linux lea registros clave en TCSR.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"product-security@qualcomm.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.0,\"impactScore\":4.0}]},\"weaknesses\":[{\"source\":\"product-security@qualcomm.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1262\"}]}],\"references\":[{\"url\":\"https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2025-bulletin.html\",\"source\":\"product-security@qualcomm.com\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-45556\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-07T15:51:44.636784Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-07T15:51:51.378Z\"}}], \"cna\": {\"title\": \"Improper Access Control for Register Interface in TZ Firmware\", \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Qualcomm, Inc.\", \"product\": \"Snapdragon\", \"versions\": [{\"status\": \"affected\", \"version\": \"FastConnect 6900\"}, {\"status\": \"affected\", \"version\": \"FastConnect 7800\"}, {\"status\": \"affected\", \"version\": \"Immersive Home 3210 Platform\"}, {\"status\": \"affected\", \"version\": \"Immersive Home 326 Platform\"}, {\"status\": \"affected\", \"version\": \"IPQ5300\"}, {\"status\": \"affected\", \"version\": \"IPQ5302\"}, {\"status\": \"affected\", \"version\": \"IPQ5312\"}, {\"status\": \"affected\", \"version\": \"IPQ5332\"}, {\"status\": \"affected\", \"version\": \"IPQ9008\"}, {\"status\": \"affected\", \"version\": \"IPQ9048\"}, {\"status\": \"affected\", \"version\": \"IPQ9554\"}, {\"status\": \"affected\", \"version\": \"IPQ9570\"}, {\"status\": \"affected\", \"version\": \"IPQ9574\"}, {\"status\": \"affected\", \"version\": \"QCA0000\"}, {\"status\": \"affected\", \"version\": \"QCA8075\"}, {\"status\": \"affected\", \"version\": \"QCA8081\"}, {\"status\": \"affected\", \"version\": \"QCA8082\"}, {\"status\": \"affected\", \"version\": \"QCA8084\"}, {\"status\": \"affected\", \"version\": \"QCA8085\"}, {\"status\": \"affected\", \"version\": \"QCA8386\"}, {\"status\": \"affected\", \"version\": \"QCF8000\"}, {\"status\": \"affected\", \"version\": \"QCF8000SFP\"}, {\"status\": \"affected\", \"version\": \"QCF8001\"}, {\"status\": \"affected\", \"version\": \"QCN5124\"}, {\"status\": \"affected\", \"version\": \"QCN6224\"}, {\"status\": \"affected\", \"version\": \"QCN6402\"}, {\"status\": \"affected\", \"version\": \"QCN6412\"}, {\"status\": \"affected\", \"version\": \"QCN6422\"}, {\"status\": \"affected\", \"version\": \"QCN6432\"}, {\"status\": \"affected\", \"version\": \"QCN9000\"}, {\"status\": \"affected\", \"version\": \"QCN9012\"}, {\"status\": \"affected\", \"version\": \"QCN9013\"}, {\"status\": \"affected\", \"version\": \"QCN9024\"}, {\"status\": \"affected\", \"version\": \"QCN9074\"}, {\"status\": \"affected\", \"version\": \"QCN9160\"}, {\"status\": \"affected\", \"version\": \"QCN9274\"}, {\"status\": \"affected\", \"version\": \"QXM8083\"}, {\"status\": \"affected\", \"version\": \"SD 8 Gen1 5G\"}, {\"status\": \"affected\", \"version\": \"SDM429W\"}, {\"status\": \"affected\", \"version\": \"SDX65M\"}, {\"status\": \"affected\", \"version\": \"Snapdragon 429 Mobile Platform\"}, {\"status\": \"affected\", \"version\": \"Snapdragon AR1 Gen 1 Platform\"}, {\"status\": \"affected\", \"version\": \"Snapdragon AR1 Gen 1 Platform \\\"Luna1\\\"\"}, {\"status\": \"affected\", \"version\": \"Snapdragon AR2 Gen 1 Platform\"}, {\"status\": \"affected\", \"version\": \"Snapdragon Wear 4100+ Platform\"}, {\"status\": \"affected\", \"version\": \"Snapdragon X65 5G Modem-RF System\"}, {\"status\": \"affected\", \"version\": \"SSG2115P\"}, {\"status\": \"affected\", \"version\": \"SSG2125P\"}, {\"status\": \"affected\", \"version\": \"SXR1230P\"}, {\"status\": \"affected\", \"version\": \"SXR2230P\"}, {\"status\": \"affected\", \"version\": \"SXR2250P\"}, {\"status\": \"affected\", \"version\": \"WCD9380\"}, {\"status\": \"affected\", \"version\": \"WCD9385\"}, {\"status\": \"affected\", \"version\": \"WCN3620\"}, {\"status\": \"affected\", \"version\": \"WCN3660B\"}, {\"status\": \"affected\", \"version\": \"WCN3680B\"}, {\"status\": \"affected\", \"version\": \"WCN3980\"}, {\"status\": \"affected\", \"version\": \"WSA8830\"}, {\"status\": \"affected\", \"version\": \"WSA8832\"}, {\"status\": \"affected\", \"version\": \"WSA8835\"}], \"platforms\": [\"Snapdragon CCW\", \"Snapdragon Compute\", \"Snapdragon Wearables\", \"Snapdragon Wired Infrastructure and Networking\"], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2025-bulletin.html\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Cryptographic issue may arise because the access control configuration permits Linux to read key registers in TCSR.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-1262\", \"description\": \"CWE-1262: Improper Access Control for Register Interface\"}]}], \"providerMetadata\": {\"orgId\": \"2cfc7d3e-20d3-47ac-8db7-1b7285aff15f\", \"shortName\": \"qualcomm\", \"dateUpdated\": \"2025-04-07T10:15:47.649Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-45556\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-07T15:51:55.660Z\", \"dateReserved\": \"2024-09-02T10:26:15.223Z\", \"assignerOrgId\": \"2cfc7d3e-20d3-47ac-8db7-1b7285aff15f\", \"datePublished\": \"2025-04-07T10:15:47.649Z\", \"assignerShortName\": \"qualcomm\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…