Vulnerability identifier: #VU67092
Vulnerability risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-119
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
APQ8096AU
Hardware solutions /
Firmware
MDM9650
Hardware solutions /
Firmware
QCA6174A
Hardware solutions /
Firmware
QCA6574AU
Hardware solutions /
Firmware
QCS605
Hardware solutions /
Firmware
SDM429W
Hardware solutions /
Firmware
QCS603
Mobile applications /
Mobile firmware & hardware
Qualcomm215
Mobile applications /
Mobile firmware & hardware
SD429
Mobile applications /
Mobile firmware & hardware
SD820
Mobile applications /
Mobile firmware & hardware
WCD9326
Mobile applications /
Mobile firmware & hardware
WCD9335
Mobile applications /
Mobile firmware & hardware
WCD9341
Mobile applications /
Mobile firmware & hardware
WCN3615
Mobile applications /
Mobile firmware & hardware
WCN3620
Mobile applications /
Mobile firmware & hardware
WCN3660B
Mobile applications /
Mobile firmware & hardware
WCN3680
Mobile applications /
Mobile firmware & hardware
WCN3980
Mobile applications /
Mobile firmware & hardware
WCN3990
Mobile applications /
Mobile firmware & hardware
WSA8810
Mobile applications /
Mobile firmware & hardware
WSA8815
Mobile applications /
Mobile firmware & hardware
Vendor: Qualcomm
Description
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error when processing ION commands within kernel. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
APQ8096AU: All versions
MDM9650: All versions
QCA6174A: All versions
QCA6574AU: All versions
QCS603: All versions
QCS605: All versions
Qualcomm215: All versions
SD429: All versions
SD820: All versions
SDM429W: All versions
WCD9326: All versions
WCD9335: All versions
WCD9341: All versions
WCN3615: All versions
WCN3620: All versions
WCN3660B: All versions
WCN3680: All versions
WCN3980: All versions
WCN3990: All versions
WSA8810: All versions
WSA8815: All versions
External links
http://docs.qualcomm.com/product/publicresources/securitybulletin/september-2022-bulletin.html
http://source.codeaurora.org/quic/qsdk/oss/kernel/linux-msm/commit/?id=940ac530d84408d1ec308c16ac777334c722fc91
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.