Vulnerability identifier: #VU60358
Vulnerability risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-287
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
WCN3950
Mobile applications /
Mobile firmware & hardware
WCN3980
Mobile applications /
Mobile firmware & hardware
WCN3988
Mobile applications /
Mobile firmware & hardware
WCN3990
Mobile applications /
Mobile firmware & hardware
WCN3991
Mobile applications /
Mobile firmware & hardware
WCN3998
Mobile applications /
Mobile firmware & hardware
WCN3999
Mobile applications /
Mobile firmware & hardware
WCN6750
Mobile applications /
Mobile firmware & hardware
WCN6850
Mobile applications /
Mobile firmware & hardware
WCN6851
Mobile applications /
Mobile firmware & hardware
WCN6855
Mobile applications /
Mobile firmware & hardware
WSA8810
Mobile applications /
Mobile firmware & hardware
WSA8815
Mobile applications /
Mobile firmware & hardware
WSA8830
Mobile applications /
Mobile firmware & hardware
WSA8835
Mobile applications /
Mobile firmware & hardware
Vendor: Qualcomm
Description
The vulnerability allows a malicious application to elevate privileges on the system.
The vulnerability exists due to improper validation of program headers containing ELF metadata. A malicious application can bypass image verification and execute arbitrary code on the system with elevated privileges.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
WCN3950: All versions
WCN3980: All versions
WCN3988: All versions
WCN3990: All versions
WCN3991: All versions
WCN3998: All versions
WCN3999: All versions
WCN6750: All versions
WCN6850: All versions
WCN6851: All versions
WCN6855: All versions
WSA8810: All versions
WSA8815: All versions
WSA8830: All versions
WSA8835: All versions
External links
http://www.qualcomm.com/company/product-security/bulletins/february-2022-bulletin
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.