Qualcomm is one of the most widely used chipsets in Android devices, and recently disclosures were found regarding zero-day vulnerabilities in the chipset. This is actually a security flaw that can cause damage before affected companies can proceed with development. This is a correction. The lack of an immediate patch leaves users and devices vulnerable until the issue is fixed, raising concerns that attackers will exploit compromised devices. Currently, 64 chipsets have been confirmed to be affected by cyber attacks.
Zero-day vulnerability found in Qualcomm chipsets, 64 chipsets affected by security issue
The zero-day vulnerability, also known as CVE-2024-43047, is suspected to be a corruption vulnerability found in a component of Qualcomm’s chipsets that could allow an attacker to take control of the device by executing harmful code. It may become. The exact details are not being shared to avoid further exploitation.
Google’s Threat Analysis Group, in collaboration with Amnesty International’s Security Lab, was able to detect the zero-day vulnerability test. The attackers were said to have focused on high-value targets or specific individuals rather than general exploitation. The situation is made even more serious by the paucity of information available in this regard.
Qualcomm announced in its security bulletin that it has identified approximately 64 chipsets, including SoCs such as Snapdragon 8 Gen 1 and Snapdragon 888+, in addition to midrange chips that are affected. This issue also affects FastConnect connectivity modules and various modems, highlighting how widespread this issue is across various Android devices.
Many large companies are using the affected chipsets, including Samsung, OnePlus, and Motorola, and the Snapdragon X55 5G modem is also included in iPhone 12 models. It is still unclear whether iPhone users are also exposed to this vulnerability, but the focus appears to be on Android users, given that Android devices widely rely on this chipset. However, iPhones equipped with Qualcomm modems may still be at risk of exploitation.
Although Qualcomm has already issued patches to OEMs to address the vulnerability and urged companies to update quickly to prevent further damage, the security threat has raised eyebrows.
To prevent devices from being compromised, users should keep their software up to date, be wary of suspicious links and attempts, and avoid installing apps only from trusted sources, such as the Google Play Store. Manufacturers should also invest more in robust security procedures and remain transparent in the face of ongoing and concerning situations.