7.8
CWE
416
Advisory Published
CVE Published
Updated

CVE-2020-3642: Use After Free

First published: Mon Jun 01 2020(Updated: )

Use after free issue in camera applications when used randomly over multiple operations due to pointer not set to NULL after free/destroy of the object in Snapdragon Consumer IOT, Snapdragon Mobile in Kamorta, QCS605, Rennell, Saipan, SDM670, SDM710, SDM845, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

Credit: product-security@qualcomm.com

Affected SoftwareAffected VersionHow to fix
Android
Qualcomm Kamorta
qualcomm Kamorta firmware
Qualcomm QCS605
Qualcomm QCS605 Firmware
Qualcomm Rennell Firmware
Qualcomm Rennell Firmware
Qualcomm Saipan Firmware
Qualcomm Saipan Firmware
Qualcomm SD 670 Firmware
Qualcomm SDM670 Firmware
Qualcomm SD 710 Firmware
Qualcomm Snapdragon 710
Qualcomm SDA/SDM845 Firmware
Qualcomm Snapdragon 845
Qualcomm SM6150P firmware
Qualcomm SM6150P
qualcomm SM7150P firmware
qualcomm SM7150 firmware
Qualcomm SM8150P Firmware
Qualcomm SM8150 Fusion
Qualcomm SM8250
qualcomm SM8250 firmware
Qualcomm SXR1130
Qualcomm SXR1130 Firmware
Qualcomm SXR2130P Firmware
Qualcomm SXR2130 Firmware

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2020-3642?

    CVE-2020-3642 has been classified as a high severity vulnerability due to the potential for exploitation leading to arbitrary code execution.

  • How do I fix CVE-2020-3642?

    To mitigate CVE-2020-3642, users should update their devices with the latest firmware provided by Qualcomm or their device manufacturer.

  • Which devices are affected by CVE-2020-3642?

    CVE-2020-3642 affects various devices using Snapdragon platforms like Kamorta, QCS605, SDM670, SDM710, SDM845, and others.

  • What is a use-after-free vulnerability as seen in CVE-2020-3642?

    A use-after-free vulnerability occurs when a program continues to use a pointer after the memory it points to has been freed, potentially allowing an attacker to manipulate memory.

  • Can CVE-2020-3642 be exploited remotely?

    Yes, CVE-2020-3642 could potentially be exploited remotely if an attacker can send crafted data to the vulnerable camera applications.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203