Security Bulletin
This security bulletin contains information about 7 vulnerabilities.
EUVDB-ID: #VU29647
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-3700
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in WIN WLAN Host. A remote attacker can trigger out-of-bounds read error and read contents of memory on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAPQ8053: All versions
QCA9980: All versions
QCA9558: All versions
QCA9531: All versions
IPQ8074: All versions
IPQ8064: All versions
IPQ4019: All versions
SXR2130: All versions
SM8250: All versions
SM8150: All versions
SDX55: All versions
SDM439: All versions
SC8180X: All versions
QCA6574AU: All versions
MSM8996AU: All versions
MSM8909W: All versions
MDM9607: All versions
APQ8096AU: All versions
External linkshttp://www.qualcomm.com/company/product-security/bulletins/july-2020-security-bulletin
http://source.codeaurora.org/quic/la/platform/external/wpa_supplicant_8/commit?id=c8d215c57c049ed7015ded342ebaaef21b438425
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU29648
Risk: Low
CVSSv3.1: 7.3 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-10580
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in HLOS. A local attacker can gain elevated privileges on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsMDM9607: All versions
SXR2130: All versions
SM8250: All versions
SM8150: All versions
SDX55: All versions
SDM429W: All versions
SC8180X: All versions
Saipan: All versions
QCS605: All versions
QCS405: All versions
QCM2150: All versions
Nicobar: All versions
MSM8909W: All versions
External linkshttp://www.qualcomm.com/company/product-security/bulletins/july-2020-security-bulletin
http://source.codeaurora.org/quic/la/kernel/msm-4.14/commit/?id=a215c96a48843a731efc084d25c680c1cdb3bde2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU29650
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-3701
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in Camera Driver. A remote attacker can gain elevated privileges on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsSaipan: All versions
SM8250: All versions
SXR2130: All versions
External linkshttp://www.qualcomm.com/company/product-security/bulletins/july-2020-security-bulletin
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU29651
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-3688
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in Video while parsing mp4 clip with corrupted sample atoms. A remote attacker can trigger out-of-bounds read error and read contents of memory on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAPQ8009: All versions
APQ8098: All versions
APQ8096AU: All versions
APQ8053: All versions
APQ8017: All versions
Kamorta: All versions
MSM8953: All versions
MSM8940: All versions
MSM8937: All versions
MSM8920: All versions
MSM8917: All versions
MSM8909W: All versions
MSM8905: All versions
MDM9607: All versions
MDM9207C: All versions
MDM9206: All versions
MSM8996: All versions
MSM8996AU: All versions
MSM8998: All versions
QM215: All versions
QCS605: All versions
QCS405: All versions
QCM2150: All versions
QCA6574AU: All versions
Nicobar: All versions
SXR1130: All versions
SDM710: All versions
SDM670: All versions
SDA660: All versions
Rennell: All versions
SM7150: All versions
SM6150: All versions
SXR2130: All versions
SM8250: All versions
SM8150: All versions
SDX20: All versions
SDM845: All versions
SDM660: All versions
SDM636: All versions
SDM632: All versions
SDM630: All versions
SDM450: All versions
SDM439: All versions
SDM429W: All versions
SDM429: All versions
SDA845: All versions
Saipan: All versions
SA6155P: All versions
External linkshttp://www.qualcomm.com/company/product-security/bulletins/july-2020-security-bulletin
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU29649
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-3671
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in Multimedia when generating a frame buffer in OpenGL ES. A remote attacker can gain elevated privileges on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAPQ8009: All versions
SXR2130: All versions
SM8250: All versions
SM8150: All versions
SDM845: All versions
Saipan: All versions
QCS405: All versions
QCM2150: All versions
Nicobar: All versions
External linkshttp://www.qualcomm.com/company/product-security/bulletins/july-2020-security-bulletin
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU29629
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-3698
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in WLAN Host. A remote attacker can trigger out-of-bounds write and execute arbitrary code on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAPQ8009: All versions
SXR2130: All versions
SM8250: All versions
SM8150: All versions
SDX55: All versions
SDX20: All versions
SDM845: All versions
SDM660: All versions
SDM636: All versions
SDM632: All versions
SDM630: All versions
SDM450: All versions
SDM439: All versions
SDM429W: All versions
SDM429: All versions
SDA845: All versions
SC8180X: All versions
Saipan: All versions
SA6155P: All versions
QM215: All versions
QCS605: All versions
QCS405: All versions
QCN7605: All versions
QCM2150: All versions
QCA9379: All versions
QCA9377: All versions
QCA6574AU: All versions
QCA6174A: All versions
Nicobar: All versions
MSM8996AU: All versions
MSM8953: All versions
MSM8940: All versions
MSM8937: All versions
MSM8920: All versions
MSM8917: All versions
MSM8909W: All versions
MSM8905: All versions
MDM9650: All versions
MDM9607: All versions
MDM9207C: All versions
MDM9206: All versions
MDM9150: All versions
APQ8098: All versions
APQ8096AU: All versions
APQ8053: All versions
APQ8017: All versions
External linkshttp://www.qualcomm.com/company/product-security/bulletins/july-2020-security-bulletin
http://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=df541cea94d83533ff8f34a9b8ae77964788b1c7
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU29645
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-3699
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in WLAN HOST. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAPQ8009: All versions
SM7150: All versions
SM6150: All versions
MDM9640: All versions
SXR2130: All versions
SM8250: All versions
SM8150: All versions
SDX55: All versions
SDX20: All versions
SDM845: All versions
SDM660: All versions
SDM636: All versions
SDM632: All versions
SDM630: All versions
SDM450: All versions
SDM439: All versions
SDM429W: All versions
SDM429: All versions
SDA845: All versions
SC8180X: All versions
Saipan: All versions
SA6155P: All versions
QM215: All versions
QCS605: All versions
QCS405: All versions
QCN7605: All versions
QCM2150: All versions
QCA9379: All versions
QCA9377: All versions
QCA6574AU: All versions
QCA6174A: All versions
Nicobar: All versions
MSM8996AU: All versions
MSM8953: All versions
MSM8940: All versions
MSM8937: All versions
MSM8920: All versions
MSM8917: All versions
MSM8909W: All versions
MSM8905: All versions
MDM9650: All versions
MDM9607: All versions
MDM9207C: All versions
MDM9206: All versions
APQ8096AU: All versions
APQ8053: All versions
APQ8017: All versions
External linkshttp://www.qualcomm.com/company/product-security/bulletins/july-2020-security-bulletin
http://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=87baef651fcb908b334c0034e98adde90be848b0
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.