CVE-2020-11203

7.1 HIGH

📋 TL;DR

This vulnerability is a stack buffer overflow in Qualcomm Snapdragon chipsets that occurs when processing GSM/WCDMA broadcast configuration data. Attackers could exploit this to execute arbitrary code or cause denial of service on affected devices. The vulnerability affects multiple Snapdragon product lines including Auto, Mobile, Wearables, and IoT devices.

💻 Affected Systems

Products:
  • Snapdragon Auto
  • Sndapdragon Connectivity
  • Snapdragon Consumer IOT
  • Snapdragon Industrial IOT
  • Snapdragon Mobile
  • Snapdragon Wearables
Versions: Specific chipset versions not detailed in advisory; affected by firmware versions prior to February 2021 patches
Operating Systems: Android-based systems and other embedded OS using affected Snapdragon chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in baseband/radio firmware; affects devices regardless of OS version if using vulnerable chipset firmware

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, data theft, or persistent backdoor installation

🟠

Likely Case

Denial of service causing device crashes or instability

🟢

If Mitigated

Limited impact with proper input validation and memory protections

🌐 Internet-Facing: MEDIUM - Requires specific network conditions and broadcast configuration manipulation
🏢 Internal Only: LOW - Primarily affects cellular network interfaces rather than internal network services

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires ability to send specially crafted GSM/WCDMA broadcast messages to target device

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware updates released in February 2021 security bulletin

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/february-2021-bulletin

Restart Required: Yes

Instructions:

1. Check device manufacturer for firmware updates. 2. Apply Qualcomm-provided firmware patches. 3. Reboot device to activate new firmware.

🔧 Temporary Workarounds

Network filtering

all

Filter malicious GSM/WCDMA broadcast messages at network level

🧯 If You Can't Patch

  • Isolate affected devices from untrusted cellular networks
  • Implement network monitoring for abnormal broadcast traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against manufacturer's patched versions; examine Qualcomm chipset firmware version

Check Version:

Device-specific commands vary by manufacturer; typically in Settings > About Phone > Baseband version

Verify Fix Applied:

Verify firmware version has been updated to post-February 2021 release

📡 Detection & Monitoring

Log Indicators:

  • Baseband processor crashes
  • Radio interface errors
  • Unexpected device reboots

Network Indicators:

  • Abnormal GSM/WCDMA broadcast traffic
  • Suspicious cellular network interactions

SIEM Query:

Not applicable - primarily firmware/radio level vulnerability

🔗 References

📤 Share & Export