CVE-2019-10480

7.8 HIGH

📋 TL;DR

This vulnerability allows an attacker to write data outside the intended memory buffer in the WMI firmware event handler due to insufficient validation of data received from WLAN firmware. It affects a wide range of Qualcomm Snapdragon chipsets used in automotive, consumer electronics, IoT devices, mobile phones, wearables, and networking equipment. Successful exploitation could lead to arbitrary code execution or system crashes.

💻 Affected Systems

Products:
  • APQ8009
  • APQ8017
  • APQ8053
  • APQ8096AU
  • APQ8098
  • IPQ4019
  • IPQ8064
  • IPQ8074
  • MDM9206
  • MDM9207C
  • MDM9607
  • MDM9615
  • MDM9640
  • MDM9650
  • MSM8909
  • MSM8909W
  • MSM8917
  • MSM8920
  • MSM8937
  • MSM8939
  • MSM8940
  • MSM8996AU
  • QCA6174A
  • QCA6574AU
  • QCA9377
  • QCA9379
  • QCA9980
  • QCN7605
  • QCS605
  • SDA660
  • SDA845
  • SDM630
  • SDM636
  • SDM660
  • SDM670
  • SDM710
  • SDM845
  • SDX20
  • SDX24
  • SM6150
  • SM7150
  • SM8150
  • SXR1130
Versions: Specific firmware versions before December 2019 patches
Operating Systems: Android, Linux-based embedded systems, Qualcomm proprietary OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices using vulnerable Qualcomm WLAN firmware. Impact depends on device manufacturer's implementation and firmware version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with kernel privileges leading to complete device compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Device crash or denial of service through kernel panic, potentially requiring physical restart.

🟢

If Mitigated

Limited impact if devices are behind firewalls with restricted WLAN access and have updated firmware.

🌐 Internet-Facing: MEDIUM - Exploitation requires network access to WLAN interface, but many affected devices have wireless connectivity exposed.
🏢 Internal Only: HIGH - Internal attackers with network access to WLAN interfaces could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specially crafted packets to the WLAN interface. No public exploit code was available at disclosure time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware updates released December 2019

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin

Restart Required: Yes

Instructions:

1. Check with device manufacturer for firmware updates. 2. Apply Qualcomm-provided firmware patches. 3. Reboot device to load new firmware. 4. Verify patch installation through version checks.

🔧 Temporary Workarounds

Disable WLAN if not needed

linux

Turn off wireless functionality to prevent exploitation through WLAN interface

nmcli radio wifi off
ip link set wlan0 down

Network segmentation

all

Isolate affected devices on separate VLANs with strict firewall rules

🧯 If You Can't Patch

  • Implement strict network access controls to limit WLAN traffic to trusted sources only
  • Monitor for unusual WLAN traffic patterns and device crashes

🔍 How to Verify

Check if Vulnerable:

Check firmware version against manufacturer's patched versions. Use 'cat /proc/version' or manufacturer-specific commands to check chipset and firmware details.

Check Version:

Manufacturer-specific commands vary. For Android: 'getprop ro.bootloader' or 'getprop ro.build.fingerprint'

Verify Fix Applied:

Verify firmware version matches patched versions from manufacturer advisory. Test WLAN functionality remains operational.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • WLAN driver crash messages
  • Unexpected system reboots

Network Indicators:

  • Unusual WLAN packet patterns
  • Malformed 802.11 frames targeting vulnerable chipsets

SIEM Query:

source="kernel" AND "panic" OR "WLAN" AND "crash" OR device_model IN (affected_products_list)

🔗 References

📤 Share & Export