CVE-2020-3667

9.8 CRITICAL

📋 TL;DR

This is a critical buffer overflow vulnerability in Qualcomm's WPA MIC calculation that allows attackers to execute arbitrary code or cause denial of service. It affects numerous Snapdragon chipsets across automotive, mobile, IoT, and networking devices. Attackers can exploit this remotely without authentication.

💻 Affected Systems

Products:
  • Snapdragon Auto
  • Snapdragon Compute
  • Snapdragon Connectivity
  • Snapdragon Consumer IOT
  • Snapdragon Industrial IOT
  • Snapdragon Mobile
  • Snapdragon Voice & Music
  • Snapdragon Wired Infrastructure and Networking
Versions: Chipsets: APQ8098, IPQ5018, IPQ6018, IPQ8074, Kamorta, MSM8998, Nicobar, QCA6390, QCA8081, QCS404, QCS405, QCS605, Rennell, SA415M, Saipan, SC7180, SC8180X, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SM6150, SM7150, SM8150, SM8250, SXR1130
Operating Systems: Android, Linux-based systems using affected chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices using vulnerable Qualcomm chipsets with WPA functionality enabled. The vulnerability is in firmware/driver layer.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with kernel privileges leading to complete device compromise, data theft, and persistent backdoor installation.

🟠

Likely Case

Remote denial of service (device crash/reboot) or limited code execution depending on exploit sophistication.

🟢

If Mitigated

If patched, no impact. If unpatched but behind firewalls with strict WPA network controls, reduced attack surface.

🌐 Internet-Facing: HIGH - Exploitable remotely via WPA network attacks without authentication.
🏢 Internal Only: HIGH - Exploitable from within the network via WPA attacks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

CVSS 9.8 indicates critical severity with network attack vector and no authentication required. While no public PoC is known, the buffer overflow nature makes exploitation feasible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Qualcomm August 2020 security bulletin for specific chipset firmware updates

Vendor Advisory: https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin

Restart Required: Yes

Instructions:

1. Check device manufacturer for firmware updates. 2. Apply Qualcomm-provided firmware patches for affected chipsets. 3. Reboot device after patching. 4. Verify patch installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices on separate network segments with strict firewall rules.

WPA3 Migration

all

Upgrade to WPA3 if supported, as it uses different cryptographic protocols.

🧯 If You Can't Patch

  • Disable WPA functionality if not required (use wired or alternative wireless security)
  • Implement strict network access controls and monitor for anomalous WPA traffic

🔍 How to Verify

Check if Vulnerable:

Check device chipset model and firmware version against Qualcomm's advisory. Use 'cat /proc/cpuinfo' on Linux devices to identify chipset.

Check Version:

Device-specific commands vary by manufacturer. For Android: 'getprop ro.bootloader' or check Settings > About phone.

Verify Fix Applied:

Verify firmware version has been updated to post-August 2020 patches from device manufacturer.

📡 Detection & Monitoring

Log Indicators:

  • Kernel crashes or reboots
  • WPA authentication failures
  • Unusual wireless driver errors

Network Indicators:

  • Malformed WPA handshake packets
  • Excessive WPA association attempts

SIEM Query:

Search for: 'WPA MIC error', 'buffer overflow', 'Qualcomm driver crash', or device-specific crash logs

🔗 References

📤 Share & Export