Loading HuntDB...

CVE-2024-45553

HIGH
Published 2025-01-06T10:33:29.773Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2024-45553. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
7.8
/10
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A Impact: N/A

EPSS Score

v2025.03.14
0.000
probability
of exploitation in the wild

There is a 0.0% chance that this vulnerability will be exploited in the wild within the next 30 days.

Updated: 2025-06-25
Exploit Probability
Percentile: 0.049
Higher than 4.9% of all CVEs

Attack Vector Metrics

Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Description

Memory corruption can occur when process-specific maps are added to the global list. If a map is removed from the global list while another thread is using it for a process-specific task, issues may arise.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

Affected Versions:

AR8035 FastConnect 6200 FastConnect 6700 FastConnect 6900 FastConnect 7800 Flight RB5 5G Platform QAM8255P QAM8295P QAM8620P QAM8650P QAM8775P QAMSRV1H QAMSRV1M QCA6174A QCA6391 QCA6574 QCA6574A QCA6574AU QCA6584AU QCA6595 QCA6595AU QCA6688AQ QCA6696 QCA6698AQ QCA6797AQ QCA8081 QCA8337 QCC710 QCM4325 QCM4490 QCN6224 QCN6274 QCS4490 QCS7230 QCS8250 QCS8550 QDU1000 QDU1010 QDU1110 QDU1210 QDX1010 QDX1011 QEP8111 QFW7114 QFW7124 QRB5165N QRU1032 QRU1052 QRU1062 Qualcomm Video Collaboration VC5 Platform Robotics RB5 Platform SA6155P SA7255P SA7775P SA8155P SA8195P SA8255P SA8295P SA8620P SA8650P SA8770P SA8775P SA9000P SD 8 Gen1 5G SG4150P SM4635 SM6650 SM7635 SM7675 SM7675P SM8550P SM8635 SM8635P Snapdragon 4 Gen 1 Mobile Platform Snapdragon 4 Gen 2 Mobile Platform Snapdragon 460 Mobile Platform Snapdragon 480 5G Mobile Platform Snapdragon 480+ 5G Mobile Platform (SM4350-AC) Snapdragon 662 Mobile Platform Snapdragon 680 4G Mobile Platform Snapdragon 685 4G Mobile Platform (SM6225-AD) Snapdragon 695 5G Mobile Platform Snapdragon 8 Gen 1 Mobile Platform Snapdragon 8 Gen 2 Mobile Platform Snapdragon 8 Gen 3 Mobile Platform Snapdragon 8+ Gen 1 Mobile Platform Snapdragon 8+ Gen 2 Mobile Platform Snapdragon AR1 Gen 1 Platform Snapdragon AR1 Gen 1 Platform "Luna1" Snapdragon AR2 Gen 1 Platform Snapdragon Auto 5G Modem-RF Gen 2 Snapdragon W5+ Gen 1 Wearable Platform Snapdragon X35 5G Modem-RF System Snapdragon X72 5G Modem-RF System Snapdragon X75 5G Modem-RF System SRV1H SRV1L SRV1M SSG2115P SSG2125P SW5100 SW5100P SXR1230P SXR2230P SXR2250P TalynPlus WCD9340 WCD9370 WCD9375 WCD9378 WCD9380 WCD9385 WCD9390 WCD9395 WCN3950 WCN3988 WCN6450 WCN6650 WCN6755 WCN7861 WCN7881 WSA8810 WSA8815 WSA8830 WSA8832 WSA8835 WSA8840 WSA8845 WSA8845H

EU Vulnerability Database

Monitored by ENISA for EU cybersecurity

EU Coordination

EU Coordinated

Exploitation Status

No Known Exploitation

ENISA Analysis

Malicious code in bioql (PyPI)

Affected Products (ENISA)

qualcomm, inc.
snapdragon

ENISA Scoring

CVSS Score (3.1)

7.8
/10
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS Score

0.030
probability

Data provided by ENISA EU Vulnerability Database. Last updated: October 3, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed HIGH

GHSA-g9w9-pqmh-3hm7

Advisory Details

Memory corruption can occur when process-specific maps are added to the global list. If a map is removed from the global list while another thread is using it for a process-specific task, issues may arise.

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: January 6, 2025, Modified: January 6, 2025

References

Published: 2025-01-06T10:33:29.773Z
Last Modified: 2025-01-08T04:55:46.814Z
Copied to clipboard!