CVE-2015-9201

9.8 CRITICAL

📋 TL;DR

An integer overflow vulnerability in the Qualcomm TrustZone Baseband Processor (tzbsp) allows attackers to escalate privileges on affected Android devices. This affects Android devices with Qualcomm Snapdragon chipsets before the April 2018 security patch. Successful exploitation could give attackers elevated system privileges.

💻 Affected Systems

Products:
  • Android devices with Qualcomm Snapdragon chipsets
Versions: Android versions before April 5, 2018 security patch level
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Affects specific Qualcomm Snapdragon chipsets including Automobile, Mobile, and Wear variants listed in CVE description.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise with root/system-level access, allowing installation of persistent malware, data theft, and bypassing of all security controls.

🟠

Likely Case

Privilege escalation from a lower-privileged app to system-level access, enabling data theft, surveillance, or further exploitation.

🟢

If Mitigated

Limited impact if device is fully patched and has additional security controls like verified boot and SELinux enforcement.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access or ability to execute code on device. No public exploit code available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android security patch level April 5, 2018 or later

Vendor Advisory: https://source.android.com/security/bulletin/2018-04-01

Restart Required: Yes

Instructions:

1. Check device security patch level in Settings > About phone > Android security patch level. 2. If before April 2018, install latest available system update. 3. For enterprise devices, push updates through MDM/EMM solutions.

🔧 Temporary Workarounds

No effective workarounds

all

This is a firmware-level vulnerability requiring vendor patches. No configuration changes can mitigate the vulnerability.

🧯 If You Can't Patch

  • Isolate affected devices from sensitive networks and data
  • Implement strict application whitelisting and monitoring

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android security patch level. If date is before April 5, 2018, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify security patch level shows April 2018 or later. Check Qualcomm chipset version matches affected list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation attempts
  • SELinux denials related to tzbsp
  • Abnormal TrustZone access patterns

Network Indicators:

  • Unusual outbound connections from system processes
  • Suspicious update/package installation traffic

SIEM Query:

source="android_logs" AND (event="privilege_escalation" OR process="tzbsp")

🔗 References

📤 Share & Export