CWE
120
Advisory Published
CVE Published
Updated

CVE-2020-3657

First published: Mon Oct 05 2020(Updated: )

u'Remote code execution can happen by sending a carefully crafted POST query when Device configuration is accessed from a tethered client through webserver due to lack of array bound check.' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, IPQ4019, IPQ6018, IPQ8064, IPQ8074, MDM9150, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909W, MSM8953, MSM8996AU, QCA6574AU, QCS405, QCS610, QRB5165, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM630, SDM632, SDM636, SDM660, SDM845, SDX20, SDX24, SDX55, SM8250

Credit: product-security@qualcomm.com

Affected SoftwareAffected VersionHow to fix
Qualcomm apq8009 firmware
Qualcomm apq8009
Qualcomm apq8017 firmware
Qualcomm apq8017
Qualcomm APQ8053 Firmware
Qualcomm APQ8053 Firmware
Qualcomm apq8096au firmware
Qualcomm apq8096au
qualcomm APQ8098 firmware
qualcomm APQ8098
Qualcomm IPQ4019
Qualcomm IPQ4019 Firmware
qualcomm ipq6018 firmware
qualcomm ipq6018
Qualcomm IPQ8064
qualcomm IPQ8064 firmware
qualcomm ipq8074 firmware
qualcomm IPQ8074
Qualcomm MDM9150 firmware
Qualcomm MDM9150
Qualcomm MDM9206 firmware
Qualcomm MDM9206
qualcomm MDM9207C firmware
qualcomm MDM9207C
Qualcomm MDM9607 firmware
Qualcomm MDM9607
qualcomm mdm9640 firmware
qualcomm MDM9640
Qualcomm MDM9650 firmware
Qualcomm MDM9650
qualcomm MSM8905 firmware
qualcomm MSM8905
Qualcomm MSM8909W
Qualcomm MSM8909W
Qualcomm msm8953 firmware
Qualcomm msm8953
Qualcomm MSM8996AU Firmware
Qualcomm MSM8996AU Firmware
qualcomm qca6574au firmware
qualcomm qca6574au
Qualcomm QCS405 Firmware
Qualcomm QCS405 Firmware
qualcomm qcs610 firmware
qualcomm qcs610
qualcomm qrb5165 firmware
qualcomm qrb5165
qualcomm SC8180X firmware
qualcomm SC8180X
qualcomm SDA660 firmware
qualcomm SDA660
qualcomm sda845 firmware
qualcomm sda845
qualcomm SDM429 firmware
qualcomm SDM429
qualcomm SDM429W firmware
qualcomm SDM429W
qualcomm SDM630 firmware
qualcomm SDM630
qualcomm SDM632 firmware
qualcomm SDM632
qualcomm SDM636 firmware
qualcomm SDM636
qualcomm SDM660 firmware
qualcomm SDM660
qualcomm SDM845 firmware
qualcomm SDM845
Qualcomm SDX20 Firmware
Qualcomm SDX20 Firmware
Qualcomm sdx24 firmware
Qualcomm sdx24
Qualcomm sdx55 firmware
Qualcomm sdx55
qualcomm SM8250 firmware
Qualcomm SM8250
Android

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2020-3657?

    CVE-2020-3657 is a vulnerability that allows remote code execution by sending a carefully crafted POST query when accessing device configuration through a webserver.

  • Who is affected by CVE-2020-3657?

    CVE-2020-3657 affects Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, and various Qualcomm firmware versions used in Google Android.

  • What is the severity of CVE-2020-3657?

    CVE-2020-3657 has a severity rating of critical with a severity value of 9.

  • How can the CVE-2020-3657 vulnerability be fixed?

    To fix the CVE-2020-3657 vulnerability, apply the necessary security patches provided by Google Android or Qualcomm.

  • Where can I find more information about CVE-2020-3657?

    You can find more information about CVE-2020-3657 in the Android Security Bulletin for October 2020 and the Qualcomm Product Security Bulletins for October 2020.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203