#VU112430 Integer underflow in Qualcomm products - CVE-2020-11208


| Updated: 2025-07-07

Vulnerability identifier: #VU112430

Vulnerability risk: Low

CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2020-11208

CWE-ID: CWE-191

Exploitation vector: Local

Exploit availability: Yes

Vulnerable software:
SD820
Mobile applications / Mobile firmware & hardware
SD821
Mobile applications / Mobile firmware & hardware
QCS603
Mobile applications / Mobile firmware & hardware
SDA855
Mobile applications / Mobile firmware & hardware
SA6145P
Mobile applications / Mobile firmware & hardware
SA6155
Mobile applications / Mobile firmware & hardware
SD 675
Mobile applications / Mobile firmware & hardware
SD660
Mobile applications / Mobile firmware & hardware
SD429
Mobile applications / Mobile firmware & hardware
SD439
Mobile applications / Mobile firmware & hardware
QCS605
Hardware solutions / Firmware
SA6155P
Hardware solutions / Firmware
SD855
Hardware solutions / Firmware

Vendor: Qualcomm

Description

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in DSP Process. A local application can execute arbitrary code.

Mitigation
Install security update from vendor's website.

Vulnerable software versions

SD820: All versions

SD821: All versions

QCS603: All versions

QCS605: All versions

SDA855: All versions

SA6155P: All versions

SA6145P: All versions

SA6155: All versions

SD855: All versions

SD 675: All versions

SD660: All versions

SD429: All versions

SD439: All versions


External links
https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2020-security-bulletin.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability