{"id":28286,"date":"2019-08-06T21:42:59","date_gmt":"2019-08-06T21:42:59","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/30365\/Millions-Of-Qualcomm-Phones-Can-Be-Owned-Over-The-Air.html"},"modified":"2019-08-06T21:42:59","modified_gmt":"2019-08-06T21:42:59","slug":"millions-of-qualcomm-phones-can-be-owned-over-the-air","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/millions-of-qualcomm-phones-can-be-owned-over-the-air\/","title":{"rendered":"Millions Of Qualcomm Phones Can Be Owned Over The Air"},"content":{"rendered":"<p><strong class=\"trailer\">Black Hat<\/strong> It is possible to thoroughly hijack a nearby vulnerable Qualcomm-based Android phone, tablet, or similar gadget, via Wi-Fi, we learned on Monday. This likely affects millions of Android devices.<\/p>\n<p>Specifically, the following two security holes, <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/blade.tencent.com\/en\/advisories\/qualpwn\/\">dubbed Qualpwn<\/a> and found by Tencent&#8217;s Blade Team, can be leveraged one after the other to potentially take over a handheld:<\/p>\n<ul readability=\"6.4411969380654\">\n<li readability=\"8\"><strong>CVE-2019-10540:<\/strong> This buffer-overflow flaw is present in Qualcomm&#8217;s Wi-Fi controller firmware. It can be exploited by broadcasting maliciously crafted packets of data over the air so that, when they are received by at-risk devices, arbitrary code included in the packets is executed by the controller.\n<p>This injected code runs within the context of the Wi-Fi controller, and can subsequently take over the adjoining cellular broadband modem. Thus, CVE-2019-10540 could be exploited by nearby miscreants over the air to silently squirt spyware into your phone to snoop on its wireless communications.<\/p>\n<p>There is also, we spotted, a related CVE-2019-10539 buffer-overflow vulnerability in the Wi-Fi firmware that is not referenced by Tencent and not part of the QualPwn coupling.<\/p>\n<\/li>\n<li readability=\"4.9019607843137\"><strong>CVE-2019-10538:<\/strong> This <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/source.codeaurora.org\/quic\/la\/kernel\/msm-4.9\/commit\/?id=e0d510ff0fcb0778571579635b53ddd7e4caeb24\">vulnerability<\/a> can be exploited by malicious code running within the Wi-Fi controller to overwrite parts of the Linux kernel running the device&#8217;s main Android operating system, paving the way for a full device compromise.\n<p>Essentially, CVE-2019-10538 lies in a Qualcomm Linux kernel component for Android. The Wi-Fi firmware is allowed to dictate the amount of data to be passed from the controller to the kernel, when the kernel should really check to make sure it isn&#8217;t being tricked into overwriting critical parts of its memory. Without these checks, a compromised controller can run roughshod over the core of the Android operating system.<\/p>\n<\/li>\n<\/ul>\n<p>Thus, it is possible for a miscreant to join a nearby wireless network, seek out a vulnerable Qualcomm-powered Android device on the same Wi-Fi network, and send malicious packets over the air to the victim to exploit CVE-2019-10540. Next, the hacker can either compromise the cellular modem and spy on it, and\/or exploit CVE-2019-10538 to take over the whole operating system at the kernel level to snoop on the owner&#8217;s every activity and move.<\/p>\n<p>Both bugs are confirmed by Tencent to exist in Google Pixel 2 and 3 devices, and anything using a Qualcomm Snapdragon 835 and 845. Meanwhile, Qualy, <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.qualcomm.com\/company\/product-security\/bulletins\">in its own advisory<\/a> released on Monday, revealed many more of its chips \u2013 which are used in hundreds of millions of Android devices \u2013 are at risk, all the way up to its top-of-the-line Snapdragon 855. Basically, if your phone or tablet uses a recent Qualcomm chipset, it&#8217;s probably at risk.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/01\/12\/android_embarassed.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"android \"><\/p>\n<h2 title=\"Never. Is never a good time to get vulnerability fixes? Never is OK with you? Cool, never it is\">Exposed: Lazy Android mobe makers couldn&#8217;t care less about security<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2018\/04\/13\/slow_android_security_fixes\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>The good news is that all the bugs have been patched by Qualcomm. CVE-2019-10538 lies within Qualy&#8217;s open-source Linux kernel driver, and is available from Google. CVE-2019-10539 and CVE-2019-10540 are patched in Qualcomm&#8217;s closed-source Wi-Fi controller firmware, which was distributed to device makers in June after Tencent privately alerts the chip designer in April.<\/p>\n<p>Now for the bad news. When exactly these fixes will filter down to actual Android users is not clear: if you&#8217;re using a supported Google-branded device, you should be able to pick up the updates as part of this month&#8217;s security patch batch. If not, you&#8217;re at the mercy of your device maker, and possibly cellular operator, to test, approve, and distribute the updates to punters.<\/p>\n<p>Full details on the bugs and how they can be exploited are not public, and no exploits have been spotted in the wild. There is more good news: there are also various security hurdles to clear, within the Linux kernel and the Wi-Fi firmware, such as stack cookies and non-executable data areas before exploitation is successful. In other words, it is non-trivial to exploit Qualpwn, but not impossible.<\/p>\n<p>Tencent&#8217;s Peter Pi and NCC Group consultant Xiling Gong plan to describe the pair of programming blunders during <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.blackhat.com\/us-19\/briefings\/schedule\/index.html#exploiting-qualcomm-wlan-and-modem-over-the-air-15481\">talks at the Black Hat<\/a> and <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.defcon.org\/html\/defcon-27\/dc-27-speakers.html#Gong\">DEF CON<\/a> hacking conferences this week in Las Vegas.<\/p>\n<h3 class=\"crosshead\"><span>But wait, there&#8217;s more<\/span><\/h3>\n<p>Also out this week from Google are <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/source.android.com\/security\/bulletin\/2019-08-01.html\">more security fixes<\/a> for various parts of Android. The worst can be exploited by maliciously crafted media messages to take over a device.<\/p>\n<p>Also, as for devices with Broadcom-based Bluetooth electronics: it&#8217;s possible to pwn the gizmos over the air via malicious data packets, which seems pretty bad and worthy of a story on its own.<\/p>\n<p>Here&#8217;s a swift summary of the bugs:<\/p>\n<ul>\n<li>CVE-2019-2120 in Android runtime &#8220;could enable a local attacker to bypass user interaction requirements in order to gain access to additional permissions.&#8221;<\/li>\n<li>CVE-2019-2121, CVE-2019-2122, and CVE-2019-2125 in Framework, with the &#8220;most severe vulnerability in this section could enable a local malicious application to execute arbitrary code within the context of a privileged process.&#8221;<\/li>\n<li>CVE-2019-2126, CVE-2019-2128, CVE-2019-2127, and CVE-2019-2129 in Media Framework, with the &#8220;most severe vulnerability in this section could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of an unprivileged process.&#8221;<\/li>\n<li>CVE-2019-2130 to CVE-2019-2137 in System, with &#8220;most severe vulnerability in this section could enable a remote attacker using a specially crafted PAC file to execute arbitrary code within the context of a privileged process.&#8221;<\/li>\n<li>CVE-2019-11516 in Broadcom&#8217;s firmware that &#8220;could enable a remote attacker using a specially crafted transmission to execute arbitrary code within the context of a privileged process.&#8221;<\/li>\n<\/ul>\n<p>There are also a bunch of other Qualcomm bugs (CVE-2019-10492, CVE-2019-10509, CVE-2019-10510, CVE-2019-10499, CVE-2019-10489, and CVE-2019-2294) fixed in the patch batch, from secure boot holes to Bluetooth mishandling.<\/p>\n<p>Again, if you&#8217;re using an officially supported Google-branded device, you should be getting these updates over the air soon if not already. If you&#8217;re not, then, well, look for updates soon from your manufacturer and\/or cellular network provider, or hope they can be installed automatically via Google Play services if they are not too low level. \u00ae<\/p>\n<p><em><strong>PS:<\/strong> Google is <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/security.googleblog.com\/2019\/08\/adopting-arm-memory-tagging-extension.html\">adding<\/a> support for Arm&#8217;s memory-tagging security feature to Android.<\/em><\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1842\/-7432\/balancing-consumerization-and-corporate-control?td=wptl1842\">Balancing consumerization and corporate control<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/30365\/Millions-Of-Qualcomm-Phones-Can-Be-Owned-Over-The-Air.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":28287,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[7375],"class_list":["post-28286","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinephoneflawconference"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Millions Of Qualcomm Phones Can Be Owned Over The Air 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/millions-of-qualcomm-phones-can-be-owned-over-the-air\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Millions Of Qualcomm Phones Can Be Owned Over The Air 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/millions-of-qualcomm-phones-can-be-owned-over-the-air\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-06T21:42:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/millions-of-qualcomm-phones-can-be-owned-over-the-air.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/millions-of-qualcomm-phones-can-be-owned-over-the-air\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/millions-of-qualcomm-phones-can-be-owned-over-the-air\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Millions Of Qualcomm Phones Can Be Owned Over The Air\",\"datePublished\":\"2019-08-06T21:42:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/millions-of-qualcomm-phones-can-be-owned-over-the-air\\\/\"},\"wordCount\":1045,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/millions-of-qualcomm-phones-can-be-owned-over-the-air\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/millions-of-qualcomm-phones-can-be-owned-over-the-air.jpg\",\"keywords\":[\"headline,phone,flaw,conference\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/millions-of-qualcomm-phones-can-be-owned-over-the-air\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/millions-of-qualcomm-phones-can-be-owned-over-the-air\\\/\",\"name\":\"Millions Of Qualcomm Phones Can Be Owned Over The Air 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/millions-of-qualcomm-phones-can-be-owned-over-the-air\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/millions-of-qualcomm-phones-can-be-owned-over-the-air\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/millions-of-qualcomm-phones-can-be-owned-over-the-air.jpg\",\"datePublished\":\"2019-08-06T21:42:59+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/millions-of-qualcomm-phones-can-be-owned-over-the-air\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/millions-of-qualcomm-phones-can-be-owned-over-the-air\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/millions-of-qualcomm-phones-can-be-owned-over-the-air\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/millions-of-qualcomm-phones-can-be-owned-over-the-air.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/millions-of-qualcomm-phones-can-be-owned-over-the-air.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/millions-of-qualcomm-phones-can-be-owned-over-the-air\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,phone,flaw,conference\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinephoneflawconference\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Millions Of Qualcomm Phones Can Be Owned Over The Air\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Millions Of Qualcomm Phones Can Be Owned Over The Air 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/millions-of-qualcomm-phones-can-be-owned-over-the-air\/","og_locale":"en_US","og_type":"article","og_title":"Millions Of Qualcomm Phones Can Be Owned Over The Air 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/millions-of-qualcomm-phones-can-be-owned-over-the-air\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-08-06T21:42:59+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/millions-of-qualcomm-phones-can-be-owned-over-the-air.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/millions-of-qualcomm-phones-can-be-owned-over-the-air\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/millions-of-qualcomm-phones-can-be-owned-over-the-air\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Millions Of Qualcomm Phones Can Be Owned Over The Air","datePublished":"2019-08-06T21:42:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/millions-of-qualcomm-phones-can-be-owned-over-the-air\/"},"wordCount":1045,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/millions-of-qualcomm-phones-can-be-owned-over-the-air\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/millions-of-qualcomm-phones-can-be-owned-over-the-air.jpg","keywords":["headline,phone,flaw,conference"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/millions-of-qualcomm-phones-can-be-owned-over-the-air\/","url":"https:\/\/www.threatshub.org\/blog\/millions-of-qualcomm-phones-can-be-owned-over-the-air\/","name":"Millions Of Qualcomm Phones Can Be Owned Over The Air 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/millions-of-qualcomm-phones-can-be-owned-over-the-air\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/millions-of-qualcomm-phones-can-be-owned-over-the-air\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/millions-of-qualcomm-phones-can-be-owned-over-the-air.jpg","datePublished":"2019-08-06T21:42:59+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/millions-of-qualcomm-phones-can-be-owned-over-the-air\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/millions-of-qualcomm-phones-can-be-owned-over-the-air\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/millions-of-qualcomm-phones-can-be-owned-over-the-air\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/millions-of-qualcomm-phones-can-be-owned-over-the-air.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/millions-of-qualcomm-phones-can-be-owned-over-the-air.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/millions-of-qualcomm-phones-can-be-owned-over-the-air\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,phone,flaw,conference","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinephoneflawconference\/"},{"@type":"ListItem","position":3,"name":"Millions Of Qualcomm Phones Can Be Owned Over The Air"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28286","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=28286"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28286\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/28287"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=28286"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=28286"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=28286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}