The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-33042

CVE-2024-33042: Qualcomm Apq8017 Buffer Overflow Flaw

CVE-2024-33042 is a buffer overflow vulnerability in Qualcomm Apq8017 Firmware caused by memory corruption when Alternative Frequency offset is set to 255. This article covers technical details, affected versions, and mitigation.

Updated: January 22, 2026

CVE-2024-33042 Overview

CVE-2024-33042 is a memory corruption vulnerability affecting a wide range of Qualcomm chipset firmware. The vulnerability is triggered when the Alternative Frequency (AF) offset value is set to 255, leading to a buffer overflow condition that can result in memory corruption. This flaw affects FM radio functionality across numerous Qualcomm mobile, automotive, IoT, and wearable platforms.

Critical Impact

Successful exploitation could allow a local attacker with low privileges to achieve arbitrary code execution, compromise device confidentiality, integrity, and availability through memory corruption.

Affected Products

  • Qualcomm Snapdragon Mobile Platforms (Snapdragon 4/6/7/8 Gen series, 2xx-8xx series)
  • Qualcomm FastConnect Wi-Fi/Bluetooth modules (FastConnect 6200, 6700, 6800, 6900, 7800)
  • Qualcomm Automotive Platforms (SA4150P, SA6155P, SA8155P, SA8255P, SA8295P, SA8775P)
  • Qualcomm IoT/Vision Intelligence Platforms (QCS series, Vision Intelligence 100/200/400)
  • Qualcomm Wearable Platforms (Snapdragon Wear 2100, 2500, 3100, SDM429W)
  • Qualcomm Audio/Connectivity Components (WCD93xx, WCN36xx/39xx, WSA88xx series)

Discovery Timeline

  • September 2, 2024 - CVE-2024-33042 published to NVD
  • August 11, 2025 - Last updated in NVD database

Technical Details for CVE-2024-33042

Vulnerability Analysis

This vulnerability is classified under CWE-120 (Buffer Copy without Checking Size of Input) and CWE-787 (Out-of-bounds Write). The flaw exists within the FM radio subsystem firmware where input validation for Alternative Frequency offset parameters is insufficient.

When processing FM radio station data, the firmware accepts an Alternative Frequency offset value without proper boundary validation. The AF offset is used to calculate memory locations for storing or accessing frequency data. When this value is set to the maximum unsigned 8-bit value (255), it causes the firmware to write data beyond the intended buffer boundaries, corrupting adjacent memory regions.

The vulnerability requires local access to the device, meaning an attacker would need to have already achieved some level of code execution or have physical access to trigger the vulnerable code path. Once triggered, the memory corruption could potentially be leveraged for privilege escalation or arbitrary code execution within the context of the affected firmware component.

Root Cause

The root cause of this vulnerability is improper input validation in the FM radio firmware component. Specifically, the code fails to validate the Alternative Frequency offset value before using it in memory operations. The offset value of 255 (0xFF) represents the maximum value for an 8-bit unsigned integer and, when used as an array index or memory offset without bounds checking, causes writes to occur outside the allocated buffer space.

This type of classic buffer overflow vulnerability indicates missing or inadequate bounds checking in the firmware's handling of FM radio RDS (Radio Data System) Alternative Frequency information.

Attack Vector

The attack requires local access with low privileges. An attacker could potentially exploit this vulnerability through:

  1. A malicious application with FM radio access permissions that crafts specially formatted FM data with the AF offset set to 255
  2. A rogue FM radio broadcast that includes malformed RDS data (though this would require proximity to the target device)
  3. Exploitation through another vulnerability that allows manipulation of FM radio parameters

The exploitation does not require user interaction, making it more dangerous in scenarios where an attacker has already achieved initial access to the device.

The vulnerable code path processes Alternative Frequency offset data without validating that the offset value falls within acceptable bounds. When an offset of 255 is provided, this exceeds the expected buffer size, causing memory corruption in adjacent data structures.

Detection Methods for CVE-2024-33042

Indicators of Compromise

  • Unexpected crashes or reboots in devices with FM radio functionality enabled
  • Anomalous FM radio-related process behavior or memory consumption patterns
  • System logs indicating memory corruption errors in audio or radio subsystems
  • Suspicious applications requesting FM radio permissions with unusual access patterns

Detection Strategies

  • Monitor for firmware version mismatches on Qualcomm-powered devices against known patched versions
  • Implement mobile device management (MDM) solutions to track firmware versions across the device fleet
  • Deploy endpoint detection and response (EDR) solutions capable of monitoring for memory corruption indicators
  • Review application permissions for unnecessary FM radio access requests

Monitoring Recommendations

  • Enable comprehensive logging on mobile device management platforms to track firmware update compliance
  • Monitor for unusual FM radio subsystem activity through Android system logs when available
  • Implement alerting for devices running known vulnerable firmware versions
  • Track Qualcomm security bulletin releases for additional context on affected devices

How to Mitigate CVE-2024-33042

Immediate Actions Required

  • Apply firmware updates from device OEMs that incorporate the Qualcomm September 2024 security patches
  • For enterprise environments, prioritize updates for devices with sensitive data or elevated access privileges
  • Consider temporarily disabling FM radio functionality on critical devices until patches are applied
  • Review and restrict application permissions for FM radio access where possible

Patch Information

Qualcomm has addressed this vulnerability in their September 2024 Security Bulletin. Device manufacturers (OEMs) are responsible for integrating these patches into their firmware updates and distributing them to end users.

Users should check with their device manufacturer for availability of security updates that include this fix. For Android devices, this may be included in monthly security patch updates from the OEM.

Workarounds

  • Disable FM radio functionality at the system level if not required for business operations
  • Implement strict application permission policies to prevent untrusted apps from accessing FM radio features
  • Use mobile device management (MDM) to enforce firmware update policies across organizational devices
  • Isolate or restrict network access for devices that cannot be immediately patched
bash
# Example: Check Android security patch level (for devices with shell access)
adb shell getprop ro.build.version.security_patch

# Example: Disable FM radio service if available on rooted devices
adb shell pm disable-user com.android.fmradio

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechQualcomm

  • SeverityHIGH

  • CVSS Score7.8

  • EPSS Probability0.12%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-120

  • CWE-787
  • Vendor Resources
  • Qualcomm Security Bulletin September 2024
  • Related CVEs
  • CVE-2025-47373: Qualcomm Fastconnect Buffer Overflow

  • CVE-2025-59603: Qualcomm SD865 Buffer Overflow Vulnerability

  • CVE-2025-59600: Qualcomm Fastconnect 6200 Buffer Overflow

  • CVE-2025-47387: Qualcomm Aqt1000 Buffer Overflow Flaw
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English