CVE-2020-11180

7.8 HIGH

📋 TL;DR

CVE-2020-11180 is an out-of-bounds memory access vulnerability in Qualcomm Snapdragon chipsets' computer vision control due to improper command length validation. This allows attackers to potentially execute arbitrary code or cause denial of service on affected devices. The vulnerability affects various Snapdragon platforms including Auto, Compute, Connectivity, Consumer IoT, Industrial IoT, and Mobile.

💻 Affected Systems

Products:
  • Qualcomm Snapdragon Auto
  • Snapdragon Compute
  • Snapdragon Connectivity
  • Snapdragon Consumer IoT
  • Snapdragon Industrial IoT
  • Snapdragon Mobile
Versions: Specific chipset versions as listed in Qualcomm December 2020 bulletin
Operating Systems: Android, Linux-based IoT systems, Automotive systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices using vulnerable Snapdragon chipsets with computer vision features enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, data theft, or persistent backdoor installation.

🟠

Likely Case

Denial of service causing device crashes or instability, potentially leading to temporary loss of functionality.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation attempts.

🌐 Internet-Facing: MEDIUM - Requires specific conditions and access to vulnerable services, but many IoT/mobile devices are internet-connected.
🏢 Internal Only: MEDIUM - Could be exploited through malicious apps or compromised internal network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires sending specially crafted commands to the vulnerable computer vision control component.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to device manufacturer updates for specific firmware versions

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin

Restart Required: Yes

Instructions:

1. Check with device manufacturer for firmware updates. 2. Apply the latest security patches from device vendor. 3. Reboot device after update installation.

🔧 Temporary Workarounds

Disable computer vision features

all

If computer vision functionality is not required, disable it to reduce attack surface.

Device-specific configuration commands vary by manufacturer

Network segmentation

all

Isolate affected devices from untrusted networks and implement strict firewall rules.

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure
  • Monitor for unusual device behavior or crashes

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against manufacturer's security bulletin and verify if using affected Snapdragon chipset.

Check Version:

Device-specific commands vary (e.g., Android: 'getprop ro.build.fingerprint', Linux-based: check /proc/version or manufacturer tools)

Verify Fix Applied:

Confirm device firmware has been updated to version containing December 2020 or later security patches from manufacturer.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device crashes
  • Memory access violation logs
  • Computer vision service failures

Network Indicators:

  • Unusual network traffic to computer vision services
  • Suspicious command patterns

SIEM Query:

Search for: 'computer vision service crash' OR 'memory access violation' AND device_type contains 'Snapdragon'

🔗 References

📤 Share & Export