#VU112419 Use After Free in Qualcomm products - CVE-2020-11175


Vulnerability identifier: #VU112419

Vulnerability risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2020-11175

CWE-ID: CWE-416

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
APQ8009W
Mobile applications / Mobile firmware & hardware
SA6155
Mobile applications / Mobile firmware & hardware
SA8155
Mobile applications / Mobile firmware & hardware
SA8155P
Mobile applications / Mobile firmware & hardware
SDA640
Mobile applications / Mobile firmware & hardware
SDA670
Mobile applications / Mobile firmware & hardware
SDA855
Mobile applications / Mobile firmware & hardware
SDM1000
Mobile applications / Mobile firmware & hardware
SDM640
Mobile applications / Mobile firmware & hardware
SDX50M
Mobile applications / Mobile firmware & hardware
SDX55M
Mobile applications / Mobile firmware & hardware
SM6125
Mobile applications / Mobile firmware & hardware
SM6350
Mobile applications / Mobile firmware & hardware
SM7225
Mobile applications / Mobile firmware & hardware
SM7250
Mobile applications / Mobile firmware & hardware
SM7250P
Mobile applications / Mobile firmware & hardware
SM8150P
Mobile applications / Mobile firmware & hardware
SXR1120
Mobile applications / Mobile firmware & hardware
SXR2130P
Mobile applications / Mobile firmware & hardware
MSM8909W
Hardware solutions / Firmware
QCS605
Hardware solutions / Firmware
QM215
Hardware solutions / Firmware
SA6155P
Hardware solutions / Firmware
SDM670
Hardware solutions / Firmware
SDM710
Hardware solutions / Firmware
SDM845
Hardware solutions / Firmware
SDX55
Hardware solutions / Firmware
SM8150
Hardware solutions / Firmware
SM8250
Hardware solutions / Firmware
SXR1130
Hardware solutions / Firmware
SXR2130
Hardware solutions / Firmware

Vendor: Qualcomm

Description

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Bluetooth Host. A local application can execute arbitrary code.

Mitigation
Install security update from vendor's website.

Vulnerable software versions

APQ8009W: All versions

MSM8909W: All versions

QCS605: All versions

QM215: All versions

SA6155: All versions

SA6155P: All versions

SA8155: All versions

SA8155P: All versions

SDA640: All versions

SDA670: All versions

SDA855: All versions

SDM1000: All versions

SDM640: All versions

SDM670: All versions

SDM710: All versions

SDM845: All versions

SDX50M: All versions

SDX55: All versions

SDX55M: All versions

SM6125: All versions

SM6350: All versions

SM7225: All versions

SM7250: All versions

SM7250P: All versions

SM8150: All versions

SM8150P: All versions

SM8250: All versions

SXR1120: All versions

SXR1130: All versions

SXR2130: All versions

SXR2130P: All versions


External links
https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2020-security-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability