Description

Memory corruption can occur if an already verified IFS2 image is overwritten, bypassing boot verification. This allows unauthorized programs to be injected into security-sensitive images, enabling the booting of a tampered IFS2 system image.

INFO

Published Date :

2025-01-06T10:33:30.879Z

Last Modified :

2025-02-28T06:09:05.191Z

Source :

qualcomm
AFFECTED PRODUCTS

The following products are affected by CVE-2024-45555 vulnerability.

Vendors Products
Qualcomm
  • Msm8996au
  • Msm8996au Firmware
  • Qam8255p
  • Qam8255p Firmware
  • Qam8295p
  • Qam8295p Firmware
  • Qam8620p
  • Qam8620p Firmware
  • Qam8650p
  • Qam8650p Firmware
  • Qam8775p
  • Qam8775p Firmware
  • Qamsrv1h
  • Qamsrv1h Firmware
  • Qamsrv1m
  • Qamsrv1m Firmware
  • Qca6564a
  • Qca6564a Firmware
  • Qca6564au
  • Qca6564au Firmware
  • Qca6574a
  • Qca6574a Firmware
  • Qca6574au
  • Qca6574au Firmware
  • Qca6584au
  • Qca6584au Firmware
  • Qca6595
  • Qca6595 Firmware
  • Qca6595au
  • Qca6595au Firmware
  • Qca6688aq
  • Qca6688aq Firmware
  • Qca6696
  • Qca6696 Firmware
  • Qca6698aq
  • Qca6698aq Firmware
  • Sa6145p
  • Sa6145p Firmware
  • Sa6150p
  • Sa6150p Firmware
  • Sa6155
  • Sa6155 Firmware
  • Sa6155p
  • Sa6155p Firmware
  • Sa7255p
  • Sa7255p Firmware
  • Sa7775p
  • Sa7775p Firmware
  • Sa8145p
  • Sa8145p Firmware
  • Sa8150p
  • Sa8150p Firmware
  • Sa8155
  • Sa8155 Firmware
  • Sa8155p
  • Sa8155p Firmware
  • Sa8195p
  • Sa8195p Firmware
  • Sa8255p
  • Sa8255p Firmware
  • Sa8295p
  • Sa8295p Firmware
  • Sa8540p
  • Sa8540p Firmware
  • Sa8620p
  • Sa8620p Firmware
  • Sa8650p
  • Sa8650p Firmware
  • Sa8770p
  • Sa8770p Firmware
  • Sa8775p
  • Sa8775p Firmware
  • Sa9000p
  • Sa9000p Firmware
  • Snapdragon 820 Automotive
  • Snapdragon 820 Automotive Firmware
  • Srv1h
  • Srv1h Firmware
  • Srv1l
  • Srv1l Firmware
  • Srv1m
  • Srv1m Firmware
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-45555.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact