### [CVE-2024-43064](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43064) ![](https://img.shields.io/static/v1?label=Product&message=Snapdragon&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=QAM8255P%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=QAM8295P%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=QAM8620P%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=QAM8650P%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=QAM8775P%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=QAMSRV1H%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=QAMSRV1M%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=QCA6574AU%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=QCA6595%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=QCA6595AU%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=QCA6688AQ%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=QCA6696%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=QCA6698AQ%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SA7255P%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SA7775P%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SA8255P%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SA8295P%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SA8540P%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SA8620P%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SA8650P%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SA8770P%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SA8775P%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SA9000P%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SDM429W%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SRV1H%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SRV1L%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=SRV1M%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=Snapdragon%20429%20Mobile%20Platform%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=WCN3620%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=WCN3660B%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls&color=brightgreen) ### Description Uncontrolled resource consumption when a driver, an application or a SMMU client tries to access the global registers through SMMU. ### POC #### Reference No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds