First published: Mon May 01 2017(Updated: )
An elevation of privilege vulnerability in the Qualcomm Secure Channel Manager driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-35401052. References: QC-CR#1081711.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Linux kernel | =3.10 | |
Linux kernel | =3.18 | |
Android | <=7.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-0620 is rated as High due to its potential to allow local malicious applications to execute arbitrary code within the kernel.
To fix CVE-2017-0620, ensure that your Android device is updated to a version that includes the patch for this vulnerability.
CVE-2017-0620 affects Android versions up to and including 7.1.2.
CVE-2017-0620 involves the Qualcomm Secure Channel Manager driver, which is responsible for secure communications.
CVE-2017-0620 requires that a privileged process be compromised locally, which means it cannot be exploited remotely.