VYPR
High severity7.0NVD Advisory· Published Mar 8, 2017· Updated May 13, 2026

CVE-2017-0464

CVE-2017-0464

Description

An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32940193. References: QC-CR#1102593.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A local elevation of privilege vulnerability in the Qualcomm Wi-Fi driver on Android allows arbitrary code execution in the kernel after compromising a privileged process.

Vulnerability

An elevation of privilege vulnerability exists in the Qualcomm Wi-Fi driver on Android. The bug allows a local malicious application to execute arbitrary code within the kernel context. The vulnerability is present in Android kernels 3.10 and 3.18, and is identified as Android ID A-32940193 and Qualcomm QC-CR#1102593 [1]. Exploitation requires first compromising a privileged process, such as a system service, to gain the necessary permissions to trigger the driver flaw.

Exploitation

To exploit this vulnerability, an attacker must first compromise a privileged process on the device, for example through another vulnerability or social engineering. Once the attacker has elevated privileges within the Android framework, they can then trigger the bug in the Qualcomm Wi-Fi driver to execute arbitrary code in the kernel. The attack is local and requires the malicious application to be installed and run on the device [1].

Impact

Successful exploitation results in arbitrary code execution in the kernel context, giving the attacker full control over the device's kernel. This leads to a complete compromise of confidentiality, integrity, and availability, as the attacker can read sensitive data, modify system files, and disrupt device operations [1].

Mitigation

The fix for this vulnerability was included in the Android Security Bulletin for March 2017. Users should apply the OTA update or ensure their device has the security patch level of 2017-03-01 or later. No workaround is available, and the fix is provided by Qualcomm as part of their driver update [1].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

6

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.