CVE-2017-18160

9.8 CRITICAL

📋 TL;DR

This vulnerability in Qualcomm's GNSS module allows attackers to cause AGPS session failures by exploiting hardcoded ciphersuites that require manual updates. It affects Snapdragon mobile and wear devices with specific chipsets, potentially disrupting location services and related functionality.

💻 Affected Systems

Products:
  • Snapdragon Mobile
  • Snapdragon Wear
Versions: MDM9635M, MDM9645, MDM9650, MDM9655, MSM8909W, SD 835, SD 845, SD 850
Operating Systems: Android-based systems using affected Qualcomm chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with the specified Qualcomm chipsets regardless of OEM implementation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of location-based services, denial of service for GPS functionality, and potential exploitation as part of attack chain to compromise device integrity.

🟠

Likely Case

Intermittent GPS/AGPS failures, degraded location accuracy, and service disruption for applications relying on precise positioning.

🟢

If Mitigated

Minimal impact with updated firmware and proper network security controls in place.

🌐 Internet-Facing: MEDIUM - Requires network access to AGPS servers but exploits protocol-level weaknesses.
🏢 Internal Only: LOW - Primarily affects mobile/wearable devices rather than internal enterprise systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires understanding of AGPS protocols and ability to intercept/modify AGPS communications.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Vendor-specific firmware updates for affected chipsets

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins

Restart Required: Yes

Instructions:

1. Check with device manufacturer for firmware updates. 2. Apply Qualcomm-provided patches for affected chipsets. 3. Reboot device after update. 4. Verify AGPS functionality post-update.

🔧 Temporary Workarounds

Disable AGPS when not needed

android

Temporarily disable Assisted GPS functionality to prevent exploitation

Settings vary by device manufacturer - typically in Location settings

Use alternative location services

android

Configure applications to use non-AGPS location sources when possible

App-specific configuration required

🧯 If You Can't Patch

  • Isolate affected devices from untrusted networks
  • Monitor for AGPS session failures and investigate anomalies

🔍 How to Verify

Check if Vulnerable:

Check device chipset model in Settings > About Phone > Hardware Information

Check Version:

adb shell getprop ro.boot.hardware.sku (for Android devices with ADB access)

Verify Fix Applied:

Test AGPS functionality and check firmware version against manufacturer's patched versions

📡 Detection & Monitoring

Log Indicators:

  • Repeated AGPS session failures
  • GNSS module errors
  • Location service timeouts

Network Indicators:

  • Unusual AGPS server communication patterns
  • Suspicious network traffic to GNSS-related ports

SIEM Query:

Search for 'AGPS failure' OR 'GNSS error' in device/system logs

🔗 References

📤 Share & Export