A Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. Five years running.A Leader in the Gartner® Magic Quadrant™Read the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI Security Portfolio
      Leading the Way in AI-Powered Security Solutions
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly ingest data from on-prem, cloud or hybrid environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Identity Security
    • Singularity Identity
      Identity Threat Detection and Response
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-class Expertise and Threat Intelligence.
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      Digital Forensics, IRR & Breach Readiness
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive solutions for seamless security operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • Partner Locator
      Your go-to source for our top partners in your region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-23369

CVE-2024-23369: Qualcomm Snapdragon Buffer Overflow Flaw

CVE-2024-23369 is a buffer overflow vulnerability in Qualcomm Snapdragon 888+ 5G firmware caused by memory corruption from invalid buffer lengths. This article covers technical details, affected systems, and mitigations.

Updated: January 22, 2026

CVE-2024-23369 Overview

CVE-2024-23369 is a memory corruption vulnerability affecting a wide range of Qualcomm chipset firmware. The vulnerability occurs when invalid length values are provided from the High-Level Operating System (HLOS) for FRS (Fingerprint Recognition System) and UDS (Unified Diagnostic Services) request/response buffers. This improper restriction of operations within the bounds of a memory buffer (CWE-119) can be exploited by a local attacker with low privileges to potentially achieve arbitrary code execution or cause system instability.

Critical Impact

Local attackers with low privileges can exploit this memory corruption vulnerability to potentially achieve complete compromise of device confidentiality, integrity, and availability on affected Qualcomm-based devices including smartphones, automotive platforms, and IoT systems.

Affected Products

  • Qualcomm Snapdragon 8 Gen 3, 8 Gen 1, 888+, 888, 870, 865+, 865, 768G, 765G, and 765 5G Mobile Platforms
  • Qualcomm Automotive Platforms (SA8775P, SA8295P, SA8255P, SA8195P, SA8155P, and related SA-series processors)
  • Qualcomm FastConnect 6200, 6700, 6800, 6900, and 7800 wireless connectivity components
  • Qualcomm Snapdragon X35, X55, X62, X65, X72, and X75 5G Modem-RF Systems
  • Qualcomm WCD audio codecs (WCD9340-WCD9395 series) and WSA amplifiers (WSA8810-WSA8845H series)

Discovery Timeline

  • October 7, 2024 - CVE-2024-23369 published to NVD
  • August 11, 2025 - Last updated in NVD database

Technical Details for CVE-2024-23369

Vulnerability Analysis

This vulnerability represents a classic memory corruption issue in Qualcomm's firmware handling of FRS (Fingerprint Recognition System) and UDS (Unified Diagnostic Services) communication buffers. The firmware fails to properly validate length parameters passed from the HLOS (High-Level Operating System), which typically runs Android or other mobile operating systems on Qualcomm-powered devices.

When the HLOS provides an invalid or malicious length value for request or response buffers, the firmware performs operations that exceed the intended memory boundaries. This can lead to buffer overflows where data is written beyond allocated memory regions, potentially corrupting adjacent memory structures, function pointers, or security-critical data.

The vulnerability requires local access and low-level privileges to exploit, but successful exploitation can result in complete compromise of the device's confidentiality, integrity, and availability. Given the widespread deployment of affected Qualcomm chipsets across smartphones, automotive infotainment systems, IoT devices, and compute platforms, the potential impact is substantial.

Root Cause

The root cause is improper input validation when processing buffer length parameters from the HLOS layer. The firmware trusts length values provided by higher-level software without adequate bounds checking, violating the principle of defense in depth. Specifically, the FRS and UDS handlers do not verify that the provided length values fall within expected ranges or match the actual allocated buffer sizes before performing memory operations.

Attack Vector

An attacker with local access to the device and low-level privileges could exploit this vulnerability by crafting malicious requests with invalid length parameters targeting the FRS or UDS interfaces. The attack flow involves:

  1. The attacker gains local access to a device running affected Qualcomm firmware
  2. Through a malicious application or compromised process, the attacker sends crafted FRS/UDS requests with manipulated length fields
  3. The firmware processes these requests without proper bounds validation
  4. Memory corruption occurs when operations exceed buffer boundaries
  5. Depending on the corruption target, the attacker may achieve code execution, privilege escalation, or cause denial of service

The local attack vector with low privilege requirements means that malicious applications installed on a device could potentially exploit this vulnerability to escalate privileges or compromise secure components.

Detection Methods for CVE-2024-23369

Indicators of Compromise

  • Unusual system crashes or reboots that may indicate memory corruption exploitation attempts
  • Anomalous behavior from applications interacting with fingerprint recognition or diagnostic services
  • Unexpected privilege escalation or unauthorized access to protected system resources
  • Memory fault logs or kernel panic reports indicating buffer boundary violations

Detection Strategies

  • Monitor system logs for abnormal FRS/UDS service behavior or unexpected crashes in firmware components
  • Implement runtime memory protection monitoring to detect out-of-bounds memory access attempts
  • Deploy mobile threat detection solutions capable of identifying suspicious application behavior targeting system services
  • Review application permissions to identify apps with unnecessary access to diagnostic interfaces

Monitoring Recommendations

  • Enable verbose logging on affected devices during security assessments to capture potential exploitation attempts
  • Implement SentinelOne's mobile and endpoint protection to detect behavioral anomalies associated with memory corruption attacks
  • Monitor for firmware integrity violations that could indicate successful exploitation
  • Track security bulletin releases from Qualcomm and device OEMs for patch availability

How to Mitigate CVE-2024-23369

Immediate Actions Required

  • Apply firmware updates from device manufacturers that include the October 2024 Qualcomm security patches
  • Limit installation of applications from untrusted sources to reduce local exploitation risk
  • Enable all available device security features including verified boot and runtime integrity checking
  • For automotive and IoT deployments, coordinate with Qualcomm and system integrators for patching schedules

Patch Information

Qualcomm addressed this vulnerability in their October 2024 Security Bulletin. Device manufacturers (OEMs) are responsible for integrating these patches into their firmware releases and distributing them to end users. Contact your device manufacturer or carrier for specific patch availability and installation instructions for your affected devices.

Workarounds

  • Restrict installation of applications to trusted sources (official app stores) to minimize local attack surface
  • Implement network segmentation for automotive and IoT deployments to limit lateral movement if devices are compromised
  • Consider device replacement for end-of-life products that will not receive security updates
  • Deploy endpoint protection solutions with memory protection capabilities to detect and prevent exploitation attempts
bash
# Verify device security patch level on Android devices
# Settings > About Phone > Android Security Patch Level
# Ensure patch level is October 2024 or later

# For enterprise deployments, use MDM to enforce minimum security patch levels
# Example policy enforcement command (varies by MDM solution)
# mdm-cli set-policy --min-security-patch "2024-10-01"

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechQualcomm

  • SeverityHIGH

  • CVSS Score7.8

  • EPSS Probability0.06%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-119
  • Vendor Resources
  • Qualcomm Security Bulletin October 2024
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • English
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use