CVE-2020-11197

9.8 CRITICAL

📋 TL;DR

This CVE describes an integer overflow vulnerability in Qualcomm Snapdragon chipsets when parsing malformed TS clip data with zero streams. Successful exploitation could allow remote code execution or denial of service. Affected devices include various Snapdragon-based automotive, mobile, IoT, and wearable products.

💻 Affected Systems

Products:
  • Snapdragon Auto
  • Snapdragon Compute
  • Snapdragon Connectivity
  • Snapdragon Consumer IOT
  • Snapdragon Industrial IOT
  • Snapdragon Mobile
  • Snapdragon Voice & Music
  • Snapdragon Wearables
Versions: Specific chipset versions not detailed in bulletin; refer to Qualcomm security bulletin for exact affected versions.
Operating Systems: Android, Linux-based embedded systems, Other Qualcomm-supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when parsing TS (Transport Stream) media files with invalid data and zero streams. Affects devices using vulnerable Snapdragon chipsets regardless of OS layer.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker gains full control of affected device, potentially leading to data theft, persistent backdoor installation, or device bricking.

🟠

Likely Case

Remote denial of service causing device crashes or instability, potentially requiring physical reset.

🟢

If Mitigated

With proper network segmentation and input validation, impact limited to isolated systems with minimal data exposure.

🌐 Internet-Facing: HIGH - Affects devices that process media streams from untrusted sources, common in mobile and IoT devices.
🏢 Internal Only: MEDIUM - Lower risk if devices only process trusted internal media streams, but still vulnerable to insider threats.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting malicious TS media files. No public exploit code known, but CVSS 9.8 suggests high attack feasibility.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to device manufacturer updates; Qualcomm provided fixes to OEMs in December 2020.

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin

Restart Required: Yes

Instructions:

1. Check with device manufacturer for firmware updates. 2. Apply latest security patches from device vendor. 3. Reboot device after update. 4. Verify patch installation through version checks.

🔧 Temporary Workarounds

Disable untrusted media processing

all

Restrict media file parsing from untrusted sources via application controls.

Network segmentation

all

Isolate affected devices from untrusted networks to limit attack surface.

🧯 If You Can't Patch

  • Segment affected devices on isolated network segments
  • Implement strict input validation for media files from external sources

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against manufacturer's patched versions. Use 'getprop ro.build.fingerprint' on Android devices to identify chipset.

Check Version:

Android: 'getprop ro.build.version.security_patch'. Linux: Check /proc/cpuinfo for chipset details.

Verify Fix Applied:

Confirm firmware version matches or exceeds patched version from manufacturer advisory. Test with known safe TS files.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process crashes in media parsing services
  • Kernel panic logs related to memory corruption
  • Abnormal TS file processing errors

Network Indicators:

  • Unusual media file transfers to affected devices
  • Network traffic spikes followed by device unresponsiveness

SIEM Query:

source="device_logs" AND ("TS parser" OR "media crash") AND severity=HIGH

🔗 References

📤 Share & Export