CVE-2020-11161

7.1 HIGH

📋 TL;DR

This vulnerability allows out-of-bounds memory access in Qualcomm Snapdragon chipsets when processing negative width values from external components. It affects multiple Snapdragon product lines including Auto, Compute, Mobile, and IoT variants. Attackers could potentially exploit this to execute arbitrary code or cause denial of service.

💻 Affected Systems

Products:
  • Snapdragon Auto
  • Snapdragon Compute
  • Snapdragon Connectivity
  • Snapdragon Consumer IOT
  • Snapdragon Industrial IOT
  • Snapdragon Mobile
  • Snapdragon Voice & Music
Versions: Specific chipset versions not detailed in public advisory
Operating Systems: Android, Linux-based embedded systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Qualcomm chipsets across multiple product categories; exact chip models require checking Qualcomm's security bulletin

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, data theft, or persistent backdoor installation

🟠

Likely Case

Denial of service (device crash/reboot) or limited information disclosure

🟢

If Mitigated

Contained impact with proper memory protections and exploit mitigations

🌐 Internet-Facing: MEDIUM - Requires external component interaction but could be triggered remotely
🏢 Internal Only: MEDIUM - Could be exploited through malicious apps or local access

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires triggering specific memory alignment calculations with negative width values

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm January 2021 security bulletin for specific chipset updates

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin

Restart Required: Yes

Instructions:

1. Check Qualcomm security bulletin for affected chipset versions. 2. Obtain firmware updates from device manufacturer. 3. Apply firmware updates following manufacturer instructions. 4. Reboot device to activate patches.

🔧 Temporary Workarounds

Input validation for external components

all

Implement strict input validation for width parameters from external sources

🧯 If You Can't Patch

  • Isolate affected devices from untrusted networks
  • Implement strict app vetting and installation controls

🔍 How to Verify

Check if Vulnerable:

Check device chipset model and firmware version against Qualcomm's security bulletin

Check Version:

Device-specific commands vary by manufacturer (e.g., 'getprop ro.build.fingerprint' on Android)

Verify Fix Applied:

Verify firmware version has been updated to patched version from manufacturer

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • Memory access violation errors
  • Unexpected device reboots

Network Indicators:

  • Unusual external component communication patterns

SIEM Query:

Device logs containing 'segmentation fault', 'memory violation', or 'kernel panic' near external component interactions

🔗 References

📤 Share & Export