CVE-2020-11144

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to cause a buffer over-read while processing invalid DL ROHC packets for decompression in Qualcomm Snapdragon chipsets. It affects multiple Snapdragon product lines including Auto, Compute, Mobile, and IoT devices. The lack of size validation for compressed packets enables potential information disclosure or denial of service.

💻 Affected Systems

Products:
  • Snapdragon Auto
  • Snapdragon Compute
  • Snapdragon Connectivity
  • Snapdragon Consumer IOT
  • Snapdragon Industrial IOT
  • Snapdragon IoT
  • Snapdragon Mobile
  • Snapdragon Voice & Music
  • Snapdragon Wearables
Versions: Multiple chipset versions prior to December 2020 security updates
Operating Systems: Android, Linux-based embedded systems, QNX, Other embedded OS using Snapdragon chips
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in firmware/baseband layer, affecting all devices using vulnerable Snapdragon chips regardless of OS configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, data exfiltration, or persistent backdoor installation.

🟠

Likely Case

Denial of service (device crash/reboot) or information disclosure from memory contents.

🟢

If Mitigated

Limited impact with proper network segmentation and packet filtering in place.

🌐 Internet-Facing: HIGH - Affected devices exposed to internet could be remotely exploited via malicious ROHC packets.
🏢 Internal Only: MEDIUM - Requires network access but could be exploited internally via rogue devices or compromised endpoints.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specially crafted ROHC packets to vulnerable devices. No public exploit code is known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: December 2020 security updates

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin

Restart Required: Yes

Instructions:

1. Check device manufacturer for firmware updates. 2. Apply Qualcomm December 2020 security patch. 3. Reboot device. 4. Verify patch installation through version checks.

🔧 Temporary Workarounds

Network Packet Filtering

all

Block or filter ROHC packets at network perimeter

iptables -A INPUT -p udp --dport 554 -j DROP # Example ROHC port blocking

Disable ROHC Compression

linux

Disable Robust Header Compression feature if not required

echo 0 > /proc/sys/net/ipv4/ip_no_pmtu_disc # May affect ROHC

🧯 If You Can't Patch

  • Segment affected devices into isolated network zones
  • Implement strict network monitoring for anomalous ROHC traffic

🔍 How to Verify

Check if Vulnerable:

Check chipset version and firmware date. Devices with Snapdragon chips and firmware older than December 2020 are likely vulnerable.

Check Version:

cat /proc/cpuinfo | grep -i qualcomm && cat /proc/version

Verify Fix Applied:

Verify firmware version includes December 2020 security patches. Check Qualcomm advisory for specific chipset patch versions.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • Baseband processor crashes
  • Unexpected device reboots

Network Indicators:

  • Anomalous ROHC packet patterns
  • Spike in malformed UDP packets on ROHC ports

SIEM Query:

source="network_firewall" AND (protocol="ROHC" OR port=554) AND packet_size>threshold

🔗 References

📤 Share & Export