Buffer Overflow Vulnerability in Qualcomm Snapdragon Products
CVE-2020-3624
Key Information:
- Vendor
- Qualcomm
- Vendor
- CVE Published:
- 8 September 2020
Summary
A potential buffer overflow vulnerability has been identified in multiple Qualcomm Snapdragon platforms. The issue arises from an integer overflow during the parsing of handler options caused by improper data type use. This flaw could allow attackers to exploit the system, potentially leading to unauthorized access or the execution of arbitrary code on affected Snapdragon devices. Affected models span various Snapdragon product lines, including automotive, mobile, IoT, and industrial applications.
Affected Version(s)
Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, Kamorta, MDM9150, MDM9205, MDM9206, MDM9207C, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCM2150, QCN7605, QCS605, QCS610, QM215, Rennell, SA415M, SA515M, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved