PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-0441 Linux CVE debrief

CVE-2017-0441 is a high-severity elevation-of-privilege vulnerability in the Qualcomm Wi‑Fi driver used by Android. According to the CVE description, a local malicious application could execute arbitrary code in the context of the kernel, but the issue first requires compromising a privileged process. NVD records the issue as affecting Android builds up to 7.1.1 as well as Linux kernel 3.10 and 3.18 CPEs, with a CVSS 3.0 vector of AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H.

Vendor
Linux
Product
CVE-2017-0441
CVSS
HIGH 7
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-08
Original CVE updated
2026-05-13
Advisory published
2017-02-08
Advisory updated
2026-05-13

Who should care

Android OEMs, device maintainers, kernel and firmware integrators, mobile security teams, and anyone supporting devices that include the affected Qualcomm Wi‑Fi driver or the listed Android/kernel versions should prioritize this issue.

Technical summary

NVD maps the vulnerability to CWE-120 and describes it as an elevation-of-privilege flaw in the Qualcomm Wi‑Fi driver. The impact is kernel-context arbitrary code execution from a local malicious app, with the caveat that the attack path first requires a privileged-process compromise. Official references point to the Android security bulletin and a CodeAurora advisory.

Defensive priority

High. The issue can lead to kernel-level compromise, but the attack path is local and requires additional privilege compromise, which narrows exposure compared with remotely reachable bugs.

Recommended defensive actions

  • Verify whether your Android builds or downstream kernels include the affected Qualcomm Wi‑Fi driver code paths.
  • Apply the Android security bulletin and any Qualcomm/CodeAurora fixes referenced for this CVE.
  • Prioritize updates for devices aligned with Android versions up to 7.1.1 and kernel lines 3.10 and 3.18 identified by NVD.
  • Review privileged-process exposure on affected devices, since the CVE description notes that compromising a privileged process is a prerequisite.
  • Confirm patch status across OEM firmware, vendor kernels, and any device-specific backports rather than relying only on upstream kernel version labels.

Evidence notes

This debrief is based on the official NVD record for CVE-2017-0441, which lists the CVSS 3.0 vector, CWE-120 mapping, affected CPEs, and references to the Android security bulletin and CodeAurora advisory. The CVE description supplied in the source corpus states that the flaw is in the Qualcomm Wi‑Fi driver and may allow kernel-context arbitrary code execution after compromising a privileged process.

Official resources

Published by NVD on 2017-02-08T15:59:01.707Z. The record was modified on 2026-05-13T00:24:29.033Z. The supplied corpus does not indicate a KEV listing.