Vulnerability identifier: #VU112430
Vulnerability risk: Low
CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID:
CWE-ID:
CWE-191
Exploitation vector: Local
Exploit availability: Yes
Vulnerable software:
SD820
Mobile applications /
Mobile firmware & hardware
SD821
Mobile applications /
Mobile firmware & hardware
QCS603
Mobile applications /
Mobile firmware & hardware
SDA855
Mobile applications /
Mobile firmware & hardware
SA6145P
Mobile applications /
Mobile firmware & hardware
SA6155
Mobile applications /
Mobile firmware & hardware
SD 675
Mobile applications /
Mobile firmware & hardware
SD660
Mobile applications /
Mobile firmware & hardware
SD429
Mobile applications /
Mobile firmware & hardware
SD439
Mobile applications /
Mobile firmware & hardware
QCS605
Hardware solutions /
Firmware
SA6155P
Hardware solutions /
Firmware
SD855
Hardware solutions /
Firmware
Vendor: Qualcomm
Description
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in DSP Process. A local application can execute arbitrary code.
Mitigation
Install security update from vendor's website.
Vulnerable software versions
SD820: All versions
SD821: All versions
QCS603: All versions
QCS605: All versions
SDA855: All versions
SA6155P: All versions
SA6145P: All versions
SA6155: All versions
SD855: All versions
SD 675: All versions
SD660: All versions
SD429: All versions
SD439: All versions
External links
https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2020-security-bulletin.html
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.