CVE-2020-11222

9.1 CRITICAL

📋 TL;DR

This vulnerability is a buffer over-read in Qualcomm Snapdragon chipsets when processing MT SMS messages with maximum length due to improper length checks. It allows attackers to read memory beyond allocated buffers, potentially exposing sensitive information. Affected devices include those using Snapdragon Auto, Compute, Connectivity, Consumer IoT, Industrial IoT, IoT, and Mobile platforms.

💻 Affected Systems

Products:
  • Snapdragon Auto
  • Snapdragon Compute
  • Snapdragon Connectivity
  • Snapdragon Consumer IOT
  • Snapdragon Industrial IOT
  • Snapdragon IoT
  • Snapdragon Mobile
Versions: Multiple Snapdragon chipset versions
Operating Systems: Android, Linux-based IoT systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with vulnerable Snapdragon chipsets regardless of OS version if firmware not updated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, data exfiltration, or persistent backdoor installation.

🟠

Likely Case

Information disclosure through memory leaks, potentially exposing sensitive data like encryption keys or user information.

🟢

If Mitigated

Limited information disclosure with proper memory protections, but still potentially exposing some sensitive data.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specially crafted SMS messages to vulnerable devices.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Vendor-specific firmware updates

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin

Restart Required: Yes

Instructions:

1. Check device manufacturer for firmware updates. 2. Apply Qualcomm-provided patches through OEM firmware updates. 3. Reboot device after update.

🔧 Temporary Workarounds

Disable SMS processing

all

Disable SMS message processing on affected devices if not required

Network filtering

all

Implement SMS filtering at network level to block malicious messages

🧯 If You Can't Patch

  • Isolate affected devices from untrusted networks
  • Implement strict SMS filtering and monitoring

🔍 How to Verify

Check if Vulnerable:

Check device chipset model and firmware version against Qualcomm advisory

Check Version:

Device-specific commands vary by manufacturer (e.g., 'getprop ro.bootloader' on Android)

Verify Fix Applied:

Verify firmware version has been updated to patched version from device manufacturer

📡 Detection & Monitoring

Log Indicators:

  • Unusual SMS processing errors
  • Memory access violations in system logs

Network Indicators:

  • Suspicious SMS traffic patterns
  • Unusual SMS message sizes

SIEM Query:

Search for SMS processing errors or memory violation events in device logs

🔗 References

📤 Share & Export