CVE-2020-11299

9.8 CRITICAL

📋 TL;DR

A buffer overflow vulnerability in Qualcomm Snapdragon video processing allows attackers to execute arbitrary code by playing specially crafted video files. This affects numerous Snapdragon-powered devices across automotive, mobile, IoT, and wearable platforms. The high CVSS score indicates critical impact potential.

💻 Affected Systems

Products:
  • Snapdragon Auto
  • Snapdragon Compute
  • Snapdragon Connectivity
  • Snapdragon Consumer IOT
  • Snapdragon Industrial IOT
  • Snapdragon Mobile
  • Snapdragon Voice & Music
  • Snapdragon Wearables
Versions: Multiple Snapdragon chipset versions - specific versions detailed in Qualcomm advisory
Operating Systems: Android, Linux-based embedded systems, QNX, Windows on Snapdragon
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices using vulnerable Snapdragon chipsets regardless of OS version. The vulnerability is in the chipset firmware/hardware video processing components.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with full system compromise, allowing attackers to install malware, steal data, or create persistent backdoors on affected devices.

🟠

Likely Case

Application crashes, denial of service, or limited code execution depending on exploit sophistication and system protections.

🟢

If Mitigated

Application crash with no code execution if modern exploit mitigations like ASLR and DEP are properly implemented and effective.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user to play a malicious video file, which could be delivered via web, email, messaging apps, or other media sharing methods.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm March 2021 security bulletin for specific chipset firmware updates

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/march-2021-bulletin

Restart Required: Yes

Instructions:

1. Check device manufacturer for available firmware updates. 2. Apply Qualcomm-provided chipset firmware patches. 3. Update device operating system if patches are delivered through OS updates. 4. Reboot device after update completion.

🔧 Temporary Workarounds

Restrict video file sources

all

Limit video playback to trusted sources only and disable automatic media playback in applications

Application sandboxing

all

Ensure video playback applications run with minimal privileges and proper sandboxing

🧯 If You Can't Patch

  • Network segmentation to isolate vulnerable devices from untrusted networks
  • Implement application allowlisting to prevent unauthorized video player applications

🔍 How to Verify

Check if Vulnerable:

Check device chipset model and firmware version against Qualcomm's advisory. Use 'getprop ro.bootloader' or similar device-specific commands to identify chipset version.

Check Version:

Device-specific: For Android devices, use 'getprop' commands or check Settings > About Phone > Build Number

Verify Fix Applied:

Verify firmware version has been updated to a version after March 2021 security patches. Check with device manufacturer for specific patch verification methods.

📡 Detection & Monitoring

Log Indicators:

  • Video player application crashes
  • Kernel panic logs related to video processing
  • Memory access violation errors in system logs

Network Indicators:

  • Unusual network traffic following video file downloads
  • Suspicious media file transfers to devices

SIEM Query:

source="*kernel*" AND ("video" OR "buffer overflow" OR "segmentation fault") AND process="*media*" OR "*video*"

🔗 References

📤 Share & Export