A team of researchers at Tencent Blade found that a series of buffer overflow vulnerabilities (known as QualPwn) that target Android devices running the Snapdragon SoCs.
As per the researchers, the vulnerability CVE-2019-10538 (“High” severity rating) can be compromised by attackers to take control of the WiFi chip on a device running an affected Qualcomm SoC.
Another vulnerability CVE-2019-10540 (marked as “critical”) lets attackers compromise the Android kernel over the air through the WLAN interface. However, the attacker needs to be on the same WiFi network.
The researchers were able to test their exploit code on Google Pixel 2 (SD835) and Pixel 3 (SD845). Hence, they claim that these chips are among the affected ones.
They first spotted the vulnerabilities earlier this year in February and March and later informed both Google and Qualcomm. Back in June Qualcomm acknowledged the vulnerability and issued a fix to OEMs.
On August 5, the chipmaker further released a security advisory, where it said that CVE-2019-10540 affects the following SoCs.
Google has released the patch for Android as a part of the August 2019 Android Security Bulletin, and the latest security update fixes the two loopholes for Pixel devices.