7.8
CWE
129
Advisory Published
CVE Published
Updated

CVE-2020-3632: Out-of-bounds Read

First published: Mon Nov 02 2020(Updated: )

u'Incorrect validation of ring context fetched from host memory can lead to memory overflow' in Snapdragon Compute, Snapdragon Mobile in QSM8350, SC7180, SDX55, SDX55M, SM6150, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P

Credit: product-security@qualcomm.com

Affected SoftwareAffected VersionHow to fix
Android
Qualcomm SM8350 Firmware
Qualcomm QSM8350 Firmware
Qualcomm SC7180P Firmware
Qualcomm SC7180P Firmware
Qualcomm SDX55M Firmware
Qualcomm SDX55 Firmware
Qualcomm SDX55M Firmware
Qualcomm SDX55M Firmware
Qualcomm SM6150P firmware
Qualcomm SM6150P
Qualcomm SM6250P Firmware
Qualcomm SM6250 Firmware
Qualcomm SM6250 Firmware
Qualcomm SM6250P Firmware
Qualcomm SM7125
Qualcomm SM7125 Firmware
qualcomm SM7150P firmware
qualcomm SM7150 firmware
qualcomm SM7150 firmware
qualcomm SM7150P firmware
Qualcomm SSM7250-AA Firmware
Qualcomm SSM7250-AA Firmware
Qualcomm SM7250 Firmware
Qualcomm SM7250
Qualcomm SM8150P Firmware
Qualcomm SM8150 Fusion
Qualcomm SM8150 Firmware
Qualcomm SA8150P
Qualcomm SM8250
qualcomm SM8250 firmware
Qualcomm SM8350P firmware
Qualcomm SM8350-AC
Qualcomm SM8350 Firmware
Qualcomm SM8350
Qualcomm SXR2130P Firmware
Qualcomm SXR2130 Firmware
Qualcomm SXR2130P Firmware
Qualcomm SXR2130

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2020-3632?

    CVE-2020-3632 has been classified with a high severity due to the potential for memory overflow.

  • How do I fix CVE-2020-3632?

    To fix CVE-2020-3632, ensure that you update to the latest firmware version provided by Qualcomm.

  • What products are affected by CVE-2020-3632?

    CVE-2020-3632 affects multiple Qualcomm devices including QSM8350, SC7180, SDX55, and several SM series chipsets.

  • What are the consequences of exploiting CVE-2020-3632?

    Exploiting CVE-2020-3632 could lead to unauthorized access and potential system instability due to a memory overflow.

  • Is there a workaround for CVE-2020-3632?

    Currently, the recommended action for CVE-2020-3632 is to apply the firmware update as there are no effective workarounds.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203