7.8
CWE
476
Advisory Published
CVE Published
Updated

CVE-2019-10600: Null Pointer Dereference

First published: Mon Dec 02 2019(Updated: )

Use of local variable as argument to netlink CB callback goes out of it scope when callback triggered lead to invalid stack memory in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, IPQ4019, IPQ8064, IPQ8074, MDM9150, MDM9206, MDM9207C, MDM9607, MDM9650, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCA6574AU, QCA8081, QCS405, QCS605, QM215, SA6155P, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

Credit: product-security@qualcomm.com

Affected SoftwareAffected VersionHow to fix
Android
Qualcomm APQ8009 Firmware
Qualcomm APQ8009
Qualcomm apq8017 firmware
Qualcomm APQ8017
qualcomm apq8053-ac firmware
Qualcomm APQ8053 Firmware
Qualcomm APQ8096AU Firmware
Qualcomm APQ8096AU Firmware
qualcomm APQ8098
Qualcomm 8098
Qualcomm IPQ4019
Qualcomm IPQ4019 Firmware
Qualcomm IPQ8064 Firmware
Qualcomm IPQ8064 Firmware
Qualcomm IPQ8074 Firmware
Qualcomm IPQ8074A
Qualcomm MDM9150 firmware
Qualcomm MDM9150 firmware
Qualcomm MDM9206
Qualcomm MDM9206 firmware
qualcomm MDM9207C firmware
Qualcomm 9207 LTE Modem
Qualcomm MD9607 Firmware
Qualcomm MDM9607 firmware
Qualcomm MDM9650
Qualcomm MDM9650 firmware
Qualcomm MSM8909W
Qualcomm MSM8909W
Qualcomm MSM8909W
Qualcomm Snapdragon 8909
Qualcomm MSM8917 Firmware
Qualcomm MSM8917 Firmware
Qualcomm 8920 Firmware
qualcomm MSM8920 firmware
Qualcomm MSM8937
qualcomm MSM8937 firmware
Qualcomm MSM8939
Qualcomm MSM8939
qualcomm MSM8940 firmware
Qualcomm MSM8940
Qualcomm MSM8953 Firmware
Qualcomm MSM8953
qualcomm MSM8996AU firmware
Qualcomm MSM8996AU Firmware
Qualcomm MSM8998
Qualcomm 8998
Qualcomm Nicobar Firmware
Qualcomm Nicobar
qualcomm qca6574au firmware
Qualcomm QCA6574AU
Qualcomm QCA8081 firmware
Qualcomm QCA8081
Qualcomm QCS405 Firmware
Qualcomm QCS405 Firmware
Qualcomm ZZ QCS605 firmware
Qualcomm QCS605 Firmware
Qualcomm 215 Firmware
Qualcomm 215
Qualcomm SA6155
Qualcomm SA6155P
Qualcomm SDA845 Firmware
Qualcomm SDA845
Qualcomm SDM429W
Qualcomm SDM429
qualcomm SDM439 firmware
Qualcomm SDM439
Qualcomm SDM450 Firmware
Qualcomm Snapdragon 450
qualcomm SDM630 firmware
qualcomm SDM630
Qualcomm SDM632
Qualcomm SDM632
Qualcomm SDM636 Firmware
Qualcomm SDM636
Qualcomm SDM660 Firmware
Qualcomm Snapdragon 660
Qualcomm SDM670 Firmware
Qualcomm SDM670
Qualcomm SD710 Firmware
Qualcomm SDM710
Qualcomm SDA/SDM845 Firmware
Qualcomm Snapdragon 845
Qualcomm SDX20 Firmware
Qualcomm SDX20 Firmware
Qualcomm SDX24 Firmware
Qualcomm SDX24
Qualcomm SDX55M Firmware
Qualcomm SDX55
qualcomm SM6150P firmware
Qualcomm SM6150P
qualcomm SM7150 firmware
qualcomm SM7150 firmware
Qualcomm SM8150 Firmware
qualcomm SM8150P
Qualcomm SM8250
Qualcomm qsm8250
Qualcomm SXR1130
Qualcomm SXR1130 Firmware
qualcomm SXR2130P firmware
Qualcomm SXR2130

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2019-10600?

    CVE-2019-10600 has been classified as critical due to its potential to corrupt memory and lead to arbitrary code execution.

  • How do I fix CVE-2019-10600?

    To fix CVE-2019-10600, update your device firmware to the latest version provided by Qualcomm or your device manufacturer.

  • Which devices are affected by CVE-2019-10600?

    CVE-2019-10600 affects a variety of Qualcomm Snapdragon platforms, including smartphones and IoT devices.

  • What types of exploits can be performed using CVE-2019-10600?

    CVE-2019-10600 could potentially allow attackers to execute arbitrary code with elevated privileges due to memory corruption.

  • Is there a workaround for CVE-2019-10600 while waiting for a patch?

    Currently, the best practice is to apply the official patch, as there are no known workarounds that effectively mitigate CVE-2019-10600.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203