First published: Thu Apr 16 2020(Updated: )
Privilege escalation by using an altered debug policy image can occur as the XPU protecting the debug policy regions are disabled during the crash dump boot flow in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in IPQ6018
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Qualcomm Ipq6018 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14116 has been rated with a high severity due to its potential for privilege escalation.
To fix CVE-2019-14116, you should apply the latest firmware updates provided by Qualcomm for affected devices.
Devices utilizing Qualcomm Snapdragon Auto, Snapdragon Compute, and Snapdragon Mobile platforms are affected by CVE-2019-14116.
The impact of CVE-2019-14116 is that an attacker could exploit the vulnerability to gain elevated privileges on the affected device.
There are no known workarounds for CVE-2019-14116; the recommended action is to update the firmware.