Vulnerability identifier: #VU112419
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-416
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
APQ8009W
Mobile applications /
Mobile firmware & hardware
SA6155
Mobile applications /
Mobile firmware & hardware
SA8155
Mobile applications /
Mobile firmware & hardware
SA8155P
Mobile applications /
Mobile firmware & hardware
SDA640
Mobile applications /
Mobile firmware & hardware
SDA670
Mobile applications /
Mobile firmware & hardware
SDA855
Mobile applications /
Mobile firmware & hardware
SDM1000
Mobile applications /
Mobile firmware & hardware
SDM640
Mobile applications /
Mobile firmware & hardware
SDX50M
Mobile applications /
Mobile firmware & hardware
SDX55M
Mobile applications /
Mobile firmware & hardware
SM6125
Mobile applications /
Mobile firmware & hardware
SM6350
Mobile applications /
Mobile firmware & hardware
SM7225
Mobile applications /
Mobile firmware & hardware
SM7250
Mobile applications /
Mobile firmware & hardware
SM7250P
Mobile applications /
Mobile firmware & hardware
SM8150P
Mobile applications /
Mobile firmware & hardware
SXR1120
Mobile applications /
Mobile firmware & hardware
SXR2130P
Mobile applications /
Mobile firmware & hardware
MSM8909W
Hardware solutions /
Firmware
QCS605
Hardware solutions /
Firmware
QM215
Hardware solutions /
Firmware
SA6155P
Hardware solutions /
Firmware
SDM670
Hardware solutions /
Firmware
SDM710
Hardware solutions /
Firmware
SDM845
Hardware solutions /
Firmware
SDX55
Hardware solutions /
Firmware
SM8150
Hardware solutions /
Firmware
SM8250
Hardware solutions /
Firmware
SXR1130
Hardware solutions /
Firmware
SXR2130
Hardware solutions /
Firmware
Vendor: Qualcomm
Description
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Bluetooth Host. A local application can execute arbitrary code.
Mitigation
Install security update from vendor's website.
Vulnerable software versions
APQ8009W: All versions
MSM8909W: All versions
QCS605: All versions
QM215: All versions
SA6155: All versions
SA6155P: All versions
SA8155: All versions
SA8155P: All versions
SDA640: All versions
SDA670: All versions
SDA855: All versions
SDM1000: All versions
SDM640: All versions
SDM670: All versions
SDM710: All versions
SDM845: All versions
SDX50M: All versions
SDX55: All versions
SDX55M: All versions
SM6125: All versions
SM6350: All versions
SM7225: All versions
SM7250: All versions
SM7250P: All versions
SM8150: All versions
SM8150P: All versions
SM8250: All versions
SXR1120: All versions
SXR1130: All versions
SXR2130: All versions
SXR2130P: All versions
External links
https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2020-security-bulletin.html
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.