CVE-2020-11202
📋 TL;DR
This CVE describes a buffer overflow/underflow vulnerability in Qualcomm Snapdragon chipsets where improper type casting leads to memory corruption. It affects numerous Snapdragon-powered devices across automotive, compute, IoT, and mobile platforms. Successful exploitation could allow attackers to execute arbitrary code or cause denial of service.
💻 Affected Systems
- Snapdragon Auto
- Snapdragon Compute
- Snapdragon Consumer IOT
- Snapdragon Industrial IOT
- Snapdragon Mobile
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with kernel privileges leading to complete device compromise, data exfiltration, or persistent backdoor installation.
Likely Case
Local privilege escalation from user to kernel space, denial of service crashes, or information disclosure through memory leaks.
If Mitigated
Limited impact with proper memory protection mechanisms and exploit mitigations in place, potentially reduced to denial of service.
🎯 Exploit Status
Exploitation requires local access or ability to execute code on the device. Demonstrated at Pwn2Own 2021 and detailed in Check Point research.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Qualcomm November 2020 security bulletin for specific patch versions per chipset
Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin
Restart Required: Yes
Instructions:
1. Check device manufacturer for firmware updates. 2. Apply Qualcomm-provided patches through OEM updates. 3. Reboot device after update installation. 4. Verify patch application through version checks.
🔧 Temporary Workarounds
Memory Protection Hardening
linuxEnable ASLR, DEP, and other memory protection features to reduce exploit reliability
echo 2 > /proc/sys/kernel/randomize_va_space
setprop ro.kernel.qemu 0
🧯 If You Can't Patch
- Restrict physical and network access to affected devices
- Implement application sandboxing and privilege separation to limit exploit impact
🔍 How to Verify
Check if Vulnerable:
Check device chipset model and firmware version against Qualcomm's affected list
Check Version:
getprop ro.bootloader or cat /proc/cpuinfo | grep -i qualcomm
Verify Fix Applied:
Verify firmware version has been updated to post-November 2020 patches from device manufacturer
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- DSP service crashes
- Memory access violation errors in system logs
Network Indicators:
- Unusual outbound connections from DSP services
- Anomalous inter-process communication patterns
SIEM Query:
source="kernel" AND ("panic" OR "oops") AND "dsp" OR source="system" AND "segmentation fault" AND "qualcomm"
🔗 References
- https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/
- https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/
- https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin
- https://blog.checkpoint.com/2020/08/06/achilles-small-chip-big-peril/
- https://research.checkpoint.com/2021/pwn2own-qualcomm-dsp/
- https://www.qualcomm.com/company/product-security/bulletins/november-2020-bulletin