Vulnerability identifier: #VU67834
Vulnerability risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-415
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Kailua
Mobile applications /
Mobile firmware & hardware
SG8275
Mobile applications /
Mobile firmware & hardware
SG8275P
Mobile applications /
Mobile firmware & hardware
SM8550
Mobile applications /
Mobile firmware & hardware
WCD9380
Mobile applications /
Mobile firmware & hardware
WCD9385
Mobile applications /
Mobile firmware & hardware
WCD9390
Mobile applications /
Mobile firmware & hardware
WCD9395
Mobile applications /
Mobile firmware & hardware
WCN6855
Mobile applications /
Mobile firmware & hardware
WCN6856
Mobile applications /
Mobile firmware & hardware
WCN7850
Mobile applications /
Mobile firmware & hardware
WCN7851
Mobile applications /
Mobile firmware & hardware
WSA8840
Mobile applications /
Mobile firmware & hardware
WSA8845
Mobile applications /
Mobile firmware & hardware
WSA8845H
Mobile applications /
Mobile firmware & hardware
Vendor: Qualcomm
Description
The vulnerability allows an attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within Bluetooth HOST while music playback and calls over bluetooth headset. An attacker with physical proximity to device can trigger a double free error and execute arbitrary code on the target system.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Kailua: All versions
SG8275: All versions
SG8275P: All versions
SM8550: All versions
WCD9380: All versions
WCD9385: All versions
WCD9390: All versions
WCD9395: All versions
WCN6855: All versions
WCN6856: All versions
WCN7850: All versions
WCN7851: All versions
WSA8840: All versions
WSA8845: All versions
WSA8845H: All versions
External links
https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2022-bulletin.html
https://git.codelinaro.org/clo/la/kernel/msm-5.10/-/commit/0f60a0e18af70b029c135555dbdf451efd8242f3
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.