<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Qualcomm, Inc. — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/qualcomm-inc./</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 26 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/qualcomm-inc./feed.xml" rel="self" type="application/rss+xml"/><item><title>Qualcomm Memory Corruption Vulnerability in Performance Counter Deselect Operation (CVE-2026-24082)</title><link>https://feed.craftedsignal.io/briefs/2024-01-qualcomm-cve-2026-24082/</link><pubDate>Fri, 26 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-qualcomm-cve-2026-24082/</guid><description>CVE-2026-24082 is a use-after-free vulnerability in Qualcomm products that occurs when copying data from a freed source during a performance counter deselect operation, potentially leading to memory corruption and arbitrary code execution.</description><content:encoded><![CDATA[<p>CVE-2026-24082 is a memory corruption vulnerability reported by Qualcomm, stemming from a use-after-free condition. The vulnerability occurs during the execution of a performance counter deselect operation, specifically when copying data from a memory location that has already been freed. Successful exploitation of this vulnerability could allow a local attacker to execute arbitrary code with elevated privileges. The vulnerability was published on May 4, 2026, and assigned a CVSS v3.1 base score of 7.8. This poses a significant risk to devices and systems incorporating vulnerable Qualcomm components, potentially leading to device instability, data compromise, or complete system takeover.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A malicious application or process gains initial access to the system through a separate vulnerability or social engineering.</li>
<li>The malicious application triggers the performance counter functionality.</li>
<li>The application initiates a deselect operation on a specific performance counter.</li>
<li>During the deselect operation, the system attempts to copy data from a memory location associated with the performance counter.</li>
<li>Due to the vulnerability, the memory location has already been freed.</li>
<li>The copy operation attempts to read from the freed memory, resulting in a use-after-free condition.</li>
<li>This can lead to memory corruption, where arbitrary data is written to the freed memory region.</li>
<li>The memory corruption can be leveraged by the attacker to execute arbitrary code with the privileges of the affected process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-24082 can lead to memory corruption and arbitrary code execution. This could allow a local attacker to gain elevated privileges on the system, potentially leading to data theft, system compromise, or denial of service. The vulnerability affects devices and systems utilizing vulnerable Qualcomm components. The exact number of affected devices is not specified, but the potential impact is significant given Qualcomm&rsquo;s widespread presence in mobile, IoT, and automotive industries.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for unusual activity related to performance counter operations, specifically process creation events associated with performance monitoring tools using the Sigma rule <code>DetectSuspiciousPerformanceCounterDeselect</code>.</li>
<li>Investigate any instances of memory corruption or use-after-free errors, especially those occurring in Qualcomm-related processes, as indicated by system logs.</li>
<li>Consult the Qualcomm security bulletin for affected product lists and recommended mitigations at the provided URL.</li>
<li>Enable process creation logging to capture events necessary for the <code>DetectSuspiciousPerformanceCounterDeselect</code> rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-24082</category><category>use-after-free</category><category>memory corruption</category><category>qualcomm</category></item></channel></rss>