CVE-2017-0464
Description
An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32940193. References: QC-CR#1102593.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A local elevation of privilege vulnerability in the Qualcomm Wi-Fi driver on Android allows arbitrary code execution in the kernel after compromising a privileged process.
Vulnerability
An elevation of privilege vulnerability exists in the Qualcomm Wi-Fi driver on Android. The bug allows a local malicious application to execute arbitrary code within the kernel context. The vulnerability is present in Android kernels 3.10 and 3.18, and is identified as Android ID A-32940193 and Qualcomm QC-CR#1102593 [1]. Exploitation requires first compromising a privileged process, such as a system service, to gain the necessary permissions to trigger the driver flaw.
Exploitation
To exploit this vulnerability, an attacker must first compromise a privileged process on the device, for example through another vulnerability or social engineering. Once the attacker has elevated privileges within the Android framework, they can then trigger the bug in the Qualcomm Wi-Fi driver to execute arbitrary code in the kernel. The attack is local and requires the malicious application to be installed and run on the device [1].
Impact
Successful exploitation results in arbitrary code execution in the kernel context, giving the attacker full control over the device's kernel. This leads to a complete compromise of confidentiality, integrity, and availability, as the attacker can read sensitive data, modify system files, and disrupt device operations [1].
Mitigation
The fix for this vulnerability was included in the Android Security Bulletin for March 2017. Users should apply the OTA update or ensure their device has the security patch level of 2017-03-01 or later. No workaround is available, and the fix is provided by Qualcomm as part of their driver update [1].
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
6- osv-coords2 versionspkg:deb/ubuntu/linux-flo@3.4.0-5.23?arch=source&distro=esm-apps/xenialpkg:deb/ubuntu/linux-mako@3.4.0-7.44?arch=source&distro=esm-apps/xenial
>= 0+ 1 more
- (no CPE)range: >= 0
- (no CPE)range: >= 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5News mentions
0No linked articles in our index yet.