CVE-2020-11214

7.5 HIGH

📋 TL;DR

This vulnerability is a buffer over-read in Qualcomm Snapdragon firmware when processing NDL attributes with unexpected length. It allows reading beyond allocated memory boundaries, potentially exposing sensitive data or causing crashes. Affected devices include numerous Snapdragon-based products across automotive, mobile, compute, IoT, and networking segments.

💻 Affected Systems

Products:
  • Snapdragon Auto
  • Snapdragon Compute
  • Snapdragon Connectivity
  • Snapdragon Consumer Electronics Connectivity
  • Snapdragon Consumer IOT
  • Snapdragon Industrial IOT
  • Snapdragon Mobile
  • Snapdragon Voice & Music
  • Snapdragon Wired Infrastructure and Networking
Versions: Specific firmware versions not publicly detailed in advisory; affected by December 2020 security bulletin
Operating Systems: Embedded firmware on Snapdragon chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in firmware handling of NDL attributes; exact affected configurations depend on specific device implementations using vulnerable firmware.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Information disclosure of sensitive firmware data, potential remote code execution if combined with other vulnerabilities, or device crashes leading to denial of service.

🟠

Likely Case

Information disclosure of adjacent memory contents, potentially exposing sensitive data or causing firmware instability and crashes.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, potentially only causing local crashes without data exposure.

🌐 Internet-Facing: MEDIUM - Exploitation requires sending malformed NDL attributes to affected devices, which may be exposed via network interfaces.
🏢 Internal Only: MEDIUM - Internal attackers with network access to affected devices could potentially exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting malformed NDL attributes with unexpected length values; specific exploit details not publicly documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware updates included in December 2020 security bulletin

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/december-2020-bulletin

Restart Required: Yes

Instructions:

1. Check with device manufacturer for firmware updates. 2. Apply Qualcomm-provided firmware patches. 3. Reboot affected devices. 4. Verify patch installation through version checks.

🔧 Temporary Workarounds

Network segmentation

all

Isolate affected devices from untrusted networks to limit attack surface

Input validation at application layer

all

Implement additional validation of NDL attributes before passing to firmware

🧯 If You Can't Patch

  • Segment affected devices in isolated network zones with strict access controls
  • Monitor network traffic for malformed NDL attribute patterns and implement rate limiting

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Qualcomm's December 2020 security bulletin; devices with pre-patch firmware are vulnerable

Check Version:

Device-specific commands vary by manufacturer; typically through device management interfaces or manufacturer-specific tools

Verify Fix Applied:

Verify firmware version has been updated to post-December 2020 patches from device manufacturer

📡 Detection & Monitoring

Log Indicators:

  • Firmware crash logs
  • Memory access violation errors
  • Unexpected device reboots

Network Indicators:

  • Unusual NDL attribute traffic patterns
  • Malformed network discovery protocol packets

SIEM Query:

Search for firmware crash events OR memory violation errors on Snapdragon devices

🔗 References

📤 Share & Export