CVE-2017-18160
📋 TL;DR
This vulnerability in Qualcomm's GNSS module allows attackers to cause AGPS session failures by exploiting hardcoded ciphersuites that require manual updates. It affects Snapdragon mobile and wear devices with specific chipsets, potentially disrupting location services and related functionality.
💻 Affected Systems
- Snapdragon Mobile
- Snapdragon Wear
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete disruption of location-based services, denial of service for GPS functionality, and potential exploitation as part of attack chain to compromise device integrity.
Likely Case
Intermittent GPS/AGPS failures, degraded location accuracy, and service disruption for applications relying on precise positioning.
If Mitigated
Minimal impact with updated firmware and proper network security controls in place.
🎯 Exploit Status
Exploitation requires understanding of AGPS protocols and ability to intercept/modify AGPS communications.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Vendor-specific firmware updates for affected chipsets
Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins
Restart Required: Yes
Instructions:
1. Check with device manufacturer for firmware updates. 2. Apply Qualcomm-provided patches for affected chipsets. 3. Reboot device after update. 4. Verify AGPS functionality post-update.
🔧 Temporary Workarounds
Disable AGPS when not needed
androidTemporarily disable Assisted GPS functionality to prevent exploitation
Settings vary by device manufacturer - typically in Location settings
Use alternative location services
androidConfigure applications to use non-AGPS location sources when possible
App-specific configuration required
🧯 If You Can't Patch
- Isolate affected devices from untrusted networks
- Monitor for AGPS session failures and investigate anomalies
🔍 How to Verify
Check if Vulnerable:
Check device chipset model in Settings > About Phone > Hardware Information
Check Version:
adb shell getprop ro.boot.hardware.sku (for Android devices with ADB access)
Verify Fix Applied:
Test AGPS functionality and check firmware version against manufacturer's patched versions
📡 Detection & Monitoring
Log Indicators:
- Repeated AGPS session failures
- GNSS module errors
- Location service timeouts
Network Indicators:
- Unusual AGPS server communication patterns
- Suspicious network traffic to GNSS-related ports
SIEM Query:
Search for 'AGPS failure' OR 'GNSS error' in device/system logs