CVE-2020-11210

9.3 CRITICAL

📋 TL;DR

This vulnerability allows memory corruption in the RPM region due to improper XPU configuration in Qualcomm Snapdragon chipsets. It affects devices using Snapdragon Connectivity, Industrial IOT, Mobile, and Wired Infrastructure and Networking chips. Successful exploitation could lead to arbitrary code execution or system compromise.

💻 Affected Systems

Products:
  • Snapdragon Connectivity
  • Snapdragon Industrial IOT
  • Snapdragon Mobile
  • Snapdragon Wired Infrastructure and Networking
Versions: Specific chipset versions not detailed in public advisory
Operating Systems: Android, Embedded Linux, Other Qualcomm-based systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Qualcomm chipsets across multiple product lines; exact chip models not specified in public bulletin.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing remote code execution, privilege escalation, and persistent access to affected systems.

🟠

Likely Case

System instability, crashes, or denial of service leading to device malfunction.

🟢

If Mitigated

Limited impact with proper memory protection mechanisms and security controls in place.

🌐 Internet-Facing: HIGH - Affects mobile and IoT devices often directly exposed to networks.
🏢 Internal Only: MEDIUM - Internal devices could be exploited through lateral movement or malicious apps.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Memory corruption vulnerabilities typically require specific conditions to exploit but can be leveraged by malicious applications or network attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm April 2021 security bulletin for specific chipset updates

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin

Restart Required: Yes

Instructions:

1. Check device manufacturer for firmware updates 2. Apply Qualcomm-provided patches 3. Update device firmware 4. Reboot device

🔧 Temporary Workarounds

Application Sandboxing

all

Restrict application permissions and isolate untrusted applications

Network Segmentation

all

Isolate affected devices from critical networks

🧯 If You Can't Patch

  • Isolate affected devices in separate network segments
  • Implement strict application whitelisting and permission controls

🔍 How to Verify

Check if Vulnerable:

Check device chipset information and compare with Qualcomm's affected products list

Check Version:

Device-specific commands vary by manufacturer (e.g., Android: 'getprop ro.bootloader' or 'cat /proc/cpuinfo')

Verify Fix Applied:

Verify firmware version matches patched versions from device manufacturer

📡 Detection & Monitoring

Log Indicators:

  • Kernel panics
  • Memory corruption errors
  • Unexpected system reboots

Network Indicators:

  • Unusual outbound connections from embedded devices
  • Anomalous traffic patterns

SIEM Query:

Device logs showing memory access violations or kernel crashes

🔗 References

📤 Share & Export