CVE-2020-11168

9.8 CRITICAL

📋 TL;DR

This CVE describes a null-pointer dereference vulnerability in Qualcomm Snapdragon chipsets that allows attackers to access memory beyond allocated buffer boundaries. When exploited, it can lead to denial of service, information disclosure, or remote code execution. Affected devices include smartphones, automotive systems, IoT devices, wearables, and computing platforms using the listed Snapdragon processors.

💻 Affected Systems

Products:
  • Snapdragon Auto
  • Snapdragon Compute
  • Snapdragon Consumer IOT
  • Snapdragon Industrial IOT
  • Snapdragon Mobile
  • Snapdragon Voice & Music
  • Snapdragon Wearables
Versions: Various firmware versions on affected chipsets
Operating Systems: Android, Linux-based embedded systems, Automotive OS variants
Default Config Vulnerable: ⚠️ Yes
Notes: Affects specific Qualcomm chipset models: APQ8009, APQ8009W, APQ8017, APQ8053, APQ8064AU, APQ8096AU, APQ8098, MDM9206, MDM9650, MSM8909W, MSM8953, MSM8996AU, QCM4290, QCS405, QCS4290, QCS603, QCS605, QM215, QSM8350, SA6155, SA6155P, SA8155, SA8155P, SDA429W, SDA640, SDA660, SDA845, SDA855, SDM1000, SDM429, SDM429W, SDM450, SDM632, SDM640, SDM830, SDM845, SDW2500, SDX20, SDX20M, SDX50M, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6250, SM6350, SM7125, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P, WCD9330

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with kernel privileges leading to complete device compromise, data theft, and persistent backdoor installation.

🟠

Likely Case

Denial of service (device crash/reboot) or information disclosure from kernel memory.

🟢

If Mitigated

Limited impact with proper memory protection mechanisms and exploit mitigations in place.

🌐 Internet-Facing: HIGH - Many affected devices are mobile/connected devices directly exposed to network attacks.
🏢 Internal Only: MEDIUM - Requires local access or network foothold for exploitation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Null-pointer dereference vulnerabilities typically require specific memory manipulation techniques. The high CVSS score suggests remote exploitation is possible without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Vendor-specific firmware updates

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin

Restart Required: Yes

Instructions:

1. Check with device manufacturer for firmware updates. 2. Apply Qualcomm-provided patches through OEM update channels. 3. Reboot device after update installation. 4. Verify patch application through version checks.

🔧 Temporary Workarounds

Network segmentation

all

Isolate affected devices from untrusted networks and internet exposure.

Memory protection enforcement

linux

Enable kernel memory protection features like KASLR, stack canaries if available.

echo 2 > /proc/sys/kernel/randomize_va_space
echo 1 > /proc/sys/kernel/kptr_restrict

🧯 If You Can't Patch

  • Implement strict network access controls and firewall rules
  • Monitor for abnormal device behavior and crash reports

🔍 How to Verify

Check if Vulnerable:

Check device chipset model and firmware version against Qualcomm advisory. Use: cat /proc/cpuinfo | grep -i qualcomm

Check Version:

getprop ro.build.fingerprint (Android) or uname -a (Linux)

Verify Fix Applied:

Verify firmware version has been updated to post-November 2020 release. Check with device manufacturer for specific patch verification.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • Null pointer dereference errors in dmesg
  • Unexpected device reboots

Network Indicators:

  • Unusual network traffic to/from affected devices
  • Port scanning targeting vulnerable services

SIEM Query:

source="kernel" AND "null pointer" OR "dereference" OR source="android" AND event="crash" AND component="kernel"

🔗 References

📤 Share & Export