CVE-2020-11246

8.4 HIGH

📋 TL;DR

A double free vulnerability in Qualcomm Snapdragon chipsets allows attackers to potentially execute arbitrary code or cause denial of service when devices enter suspend mode during secure playback. This affects multiple Snapdragon platforms including Auto, Compute, Connectivity, Consumer IoT, Industrial IoT, and Mobile. Attackers could exploit this to compromise device integrity or stability.

💻 Affected Systems

Products:
  • Snapdragon Auto
  • Snapdragon Compute
  • Snapdragon Connectivity
  • Snapdragon Consumer IOT
  • Snapdragon Industrial IOT
  • Snapdragon Mobile
Versions: Specific chipset versions not detailed in bulletin; affected by firmware/driver versions prior to April 2021 patches
Operating Systems: Android, Linux-based embedded systems using affected Snapdragon chips
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers only during secure playback when device enters suspend mode; requires specific multimedia usage patterns

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, data theft, or persistent backdoor installation

🟠

Likely Case

Device crash or reboot causing denial of service, potentially leading to temporary loss of functionality

🟢

If Mitigated

Limited impact with proper memory protections and exploit mitigations in place

🌐 Internet-Facing: MEDIUM - Requires specific conditions (secure playback + suspend mode) but could be triggered remotely via media content
🏢 Internal Only: HIGH - Local attackers or malicious apps could more easily trigger the vulnerable condition

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires precise timing during suspend mode transition and knowledge of secure playback mechanisms; no public exploits known

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware/driver updates released in April 2021 security bulletin

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/april-2021-bulletin

Restart Required: Yes

Instructions:

1. Check device manufacturer for firmware updates. 2. Apply Qualcomm-provided patches through OEM update channels. 3. Reboot device after update installation. 4. Verify patch application through version checks.

🔧 Temporary Workarounds

Disable secure playback

all

Prevent use of secure playback features that trigger the vulnerability

Device-specific configuration changes required; consult manufacturer documentation

Prevent suspend during media playback

linux

Configure devices to avoid entering suspend mode during media playback

echo 0 > /sys/power/autosuspend_delay_ms (Linux-based systems)
adb shell settings put global stay_on_while_plugged_in 7 (Android)

🧯 If You Can't Patch

  • Isolate affected devices from untrusted networks and media sources
  • Implement strict application control to prevent untrusted apps from triggering secure playback

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against manufacturer's patched versions; examine /proc/version or build properties for chipset details

Check Version:

cat /proc/version | grep -i qualcomm || getprop ro.bootloader || dmesg | grep -i qualcomm

Verify Fix Applied:

Confirm firmware version includes April 2021 or later security patches; check with manufacturer for specific patch verification

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • Double free detection in kernel logs
  • Unexpected device reboots during media playback
  • Secure playback session failures

Network Indicators:

  • Unusual media streaming patterns triggering device state changes
  • Suspicious media files designed to trigger suspend mode

SIEM Query:

source="kernel" AND ("double free" OR "panic" OR "suspend") AND ("secure" OR "playback" OR "media")

🔗 References

📤 Share & Export