First published: Mon Oct 05 2020(Updated: )
u'Remote code execution can happen by sending a carefully crafted POST query when Device configuration is accessed from a tethered client through webserver due to lack of array bound check.' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, IPQ4019, IPQ6018, IPQ8064, IPQ8074, MDM9150, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909W, MSM8953, MSM8996AU, QCA6574AU, QCS405, QCS610, QRB5165, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM630, SDM632, SDM636, SDM660, SDM845, SDX20, SDX24, SDX55, SM8250
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Google Android | ||
Qualcomm Apq8009 | ||
Google Android | ||
Qualcomm Apq8017 | ||
Qualcomm Apq8053 Firmware | ||
Qualcomm Apq8053 | ||
Google Android | ||
Google Android | ||
Google Android | ||
Qualcomm Apq8098 | ||
Qualcomm Ipq4019 Firmware | ||
Qualcomm Ipq4019 | ||
Google Android | ||
Qualcomm Ipq6018 | ||
Qualcomm Ipq8064 Firmware | ||
Qualcomm Ipq8064 | ||
Qualcomm Ipq8074 Firmware | ||
Qualcomm Ipq8074 | ||
Google Android | ||
Google Android | ||
Qualcomm Mdm9206 Firmware | ||
Qualcomm Mdm9206 | ||
Google Android | ||
Google Android | ||
Google Android | ||
Qualcomm Mdm9607 | ||
Qualcomm Mdm9640 Firmware | ||
Qualcomm Mdm9640 | ||
Qualcomm Mdm9650 Firmware | ||
Qualcomm Mdm9650 | ||
Qualcomm Msm8905 Firmware | ||
Qualcomm Msm8905 | ||
Qualcomm Msm8909w Firmware | ||
Qualcomm Msm8909w | ||
Google Android | ||
Google Android | ||
Qualcomm Msm8996au Firmware | ||
Qualcomm Msm8996au | ||
Google Android | ||
Qualcomm Qca6574au | ||
Qualcomm Qcs405 Firmware | ||
Qualcomm Qcs405 | ||
Google Android | ||
Google Android | ||
Qualcomm Qrb5165 Firmware | ||
Google Android | ||
Qualcomm Sc8180x Firmware | ||
Qualcomm Sc8180x | ||
Google Android | ||
Google Android | ||
Qualcomm Sda845 Firmware | ||
Qualcomm Sda845 | ||
Google Android | ||
Google Android | ||
Qualcomm Sdm429w Firmware | ||
Qualcomm Sdm429w | ||
Qualcomm Sdm630 Firmware | ||
Qualcomm Sdm630 | ||
Qualcomm Sdm632 Firmware | ||
Qualcomm Sdm632 | ||
Google Android | ||
Qualcomm Sdm636 | ||
Qualcomm Sdm660 Firmware | ||
Qualcomm Sdm660 | ||
Qualcomm Sdm845 Firmware | ||
Qualcomm Sdm845 | ||
Qualcomm Sdx20 Firmware | ||
Qualcomm Sdx20 | ||
Qualcomm Sdx24 Firmware | ||
Google Android | ||
Qualcomm Sdx55 Firmware | ||
Qualcomm Sdx55 | ||
Qualcomm Sm8250 Firmware | ||
Qualcomm SM8250 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3657 is a vulnerability that allows remote code execution by sending a carefully crafted POST query when accessing device configuration through a webserver.
CVE-2020-3657 affects Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, and various Qualcomm firmware versions used in Google Android.
CVE-2020-3657 has a severity rating of critical with a severity value of 9.
To fix the CVE-2020-3657 vulnerability, apply the necessary security patches provided by Google Android or Qualcomm.
You can find more information about CVE-2020-3657 in the Android Security Bulletin for October 2020 and the Qualcomm Product Security Bulletins for October 2020.