Vulnerabilites related to qualcomm - sd212
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A35FECFB-60AE-42A8-BCBB-FEA7D5826D49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9765187-8653-4D66-B230-B2CE862AC5C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE28A59C-7AA6-4B85-84E8-07852B96108E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DEE828B-09A7-4AC1-8134-491A7C87C118", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D6D6965-B5B2-46D2-8718-43B7B22441C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*", "matchCriteriaId": "E75C7497-A7DC-436B-BACD-71F69D99517D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd212_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AC3A8D2-2860-4A34-B9A8-0077263E4563", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd212:-:*:*:*:*:*:*:*", "matchCriteriaId": "B67ABF7B-5719-4C99-87C4-75499E98A281", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47AB5135-6391-45C1-81DE-803E3834F196", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCEF246C-6B39-4DC2-81B0-040DCAAD5177", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd425_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC5ECC0E-0120-47E5-9D00-440DC38F2C0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd425:-:*:*:*:*:*:*:*", "matchCriteriaId": "352E745F-375B-43AE-9B29-8A2D50C695B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd427_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9CDD792-89BC-4A7B-A971-4C04663E62A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd427:-:*:*:*:*:*:*:*", "matchCriteriaId": "64D6ACA2-47C7-4E44-A838-22600B5BC52E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd430_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6652C54-B207-4816-B70D-5DD2C792D1DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd430:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD3B99CC-CC53-42A6-9C42-0C06E734A554", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd435_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C2951AF-E04B-433B-B327-03D8D28B2BDE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd435:-:*:*:*:*:*:*:*", "matchCriteriaId": "084BB475-8F09-408E-AF1C-D0CA4DD8D414", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd450_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF6EA9F3-ED14-4DAC-93D1-2DF63C7C3EAC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd450:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4EF0B75-2431-4E44-B515-11C9BD4BC982", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd617_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F3D690E-908B-49DF-8341-9CFAE6DF5E44", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd617:-:*:*:*:*:*:*:*", "matchCriteriaId": "274F8FC2-F564-4D87-B259-6AB5E035E73E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd625_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C5E72A3-2117-4190-978F-EFB4DDE4EC9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd625:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EEF23-73EB-49AE-B9F1-4702D545D643", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A83A1CF-396D-403F-AA22-0ED817DD384B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd650:-:*:*:*:*:*:*:*", "matchCriteriaId": "21AEAA09-3C1B-4413-8418-63644DB3FABA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd652_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6C536B0-32E9-42D0-B298-B4D77CC94914", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd652:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F81E096-820A-4B27-A539-5D3BA39FA5C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC508C49-0B76-43A8-B2AF-0F8EB989E238", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd820:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9665200-D306-4EEB-9F42-6C5963524179", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd820a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB757118-0F90-4E6E-AD4F-A05A5791B20C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd820a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BCD9420-26A7-4444-9AA4-D7B0AC42FA84", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DA605FD-B801-43BB-B52D-879013F7F57E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*", "matchCriteriaId": "908BFD96-0423-4AFC-B8F3-105B2D5B4C73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DFD2C9A-6C25-4B8F-BE64-DAD3DCCDEADD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DE61FCE-CA87-46E1-981D-B44697E54CB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "84289E6D-DA2A-4D04-9DDA-E8C46DDDD056", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0B56360-7AC3-410A-B7F8-1BE8514B3781", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A02E12AC-F845-4164-9D95-ACD7167B6DD6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*", "matchCriteriaId": "321F7DE7-E6E9-449F-867B-04A9F53334B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9607, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SDM429, SDM439, SDM632, Snapdragon_High_Med_2016, when a Trusted Application has opened the SPI/I2C interface to a particular device, it is possible for another Trusted Application to read the data on this open interface by calling the SPI/I2C read function." }, { "lang": "es", "value": "En Snapdragon (Automobile, Mobile y Wear) en versiones MDM9607, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SDM429, SDM439, SDM632 y Snapdragon_High_Med_2016, cuando una aplicaci\u00f3n de confianza abre la interfaz SPI/I2C a un dispositivo en concreto, es posible para otra aplicaci\u00f3n de confianza leer los datos de esta interfaz abierta llamando a la funci\u00f3n read de SPI/I2C." } ], "id": "CVE-2017-18280", "lastModified": "2024-11-21T03:19:45.513", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-20T13:29:00.247", "references": [ { "source": "product-security@qualcomm.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041432" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041432" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" } ], "sourceIdentifier": "product-security@qualcomm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A960B86A-C397-4ACB-AEE6-55F316D32949", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "matchCriteriaId": "D79B8959-3D1E-4B48-9181-D75FE90AAF98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A35FECFB-60AE-42A8-BCBB-FEA7D5826D49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9765187-8653-4D66-B230-B2CE862AC5C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FD1C359-C79B-4CE8-A192-5AA34D0BF05B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", "matchCriteriaId": "716B747E-672C-4B95-9D8E-1262338E67EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD99C6F-2444-4A5E-A517-0C8023DDF23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE28A59C-7AA6-4B85-84E8-07852B96108E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DEE828B-09A7-4AC1-8134-491A7C87C118", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:qca6584_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "95CFB656-804A-453C-A39B-1B08C0A16BB9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:qca6584:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F0C9ED5-27E3-48EC-9A05-862715EE2034", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D6D6965-B5B2-46D2-8718-43B7B22441C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*", "matchCriteriaId": "E75C7497-A7DC-436B-BACD-71F69D99517D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd212_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AC3A8D2-2860-4A34-B9A8-0077263E4563", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd212:-:*:*:*:*:*:*:*", "matchCriteriaId": "B67ABF7B-5719-4C99-87C4-75499E98A281", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47AB5135-6391-45C1-81DE-803E3834F196", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCEF246C-6B39-4DC2-81B0-040DCAAD5177", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd410_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBD160D5-5DE6-4A74-A941-AFC4607C0F67", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd410:-:*:*:*:*:*:*:*", "matchCriteriaId": "C39B97F7-1A96-4773-B46F-88F3DE07DC2D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd412_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A31A926B-2FDD-4642-9B21-AF63DCCC263E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd412:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D2D115F-66D0-4D45-959A-F60AA111356F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd425_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC5ECC0E-0120-47E5-9D00-440DC38F2C0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd425:-:*:*:*:*:*:*:*", "matchCriteriaId": "352E745F-375B-43AE-9B29-8A2D50C695B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd427_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9CDD792-89BC-4A7B-A971-4C04663E62A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd427:-:*:*:*:*:*:*:*", "matchCriteriaId": "64D6ACA2-47C7-4E44-A838-22600B5BC52E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd430_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6652C54-B207-4816-B70D-5DD2C792D1DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd430:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD3B99CC-CC53-42A6-9C42-0C06E734A554", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd450_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF6EA9F3-ED14-4DAC-93D1-2DF63C7C3EAC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd450:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4EF0B75-2431-4E44-B515-11C9BD4BC982", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd615_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "12BB71F6-FABD-423D-AC7D-CA66BCE1A89D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd615:-:*:*:*:*:*:*:*", "matchCriteriaId": "77FB761D-7C87-4A9A-A227-17D5DBE0BDBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd616_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C73516F0-831B-40F0-BAE5-B45660D3507A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd616:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC8F5E3A-2FEF-4713-AC4D-EBAFFD697CE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd415_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "45D289EE-7423-4396-9F32-3D576E72238E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd415:-:*:*:*:*:*:*:*", "matchCriteriaId": "43EA6FCE-2BFD-4588-B793-758BA0308C24", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd625_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C5E72A3-2117-4190-978F-EFB4DDE4EC9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd625:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EEF23-73EB-49AE-B9F1-4702D545D643", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A83A1CF-396D-403F-AA22-0ED817DD384B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd650:-:*:*:*:*:*:*:*", "matchCriteriaId": "21AEAA09-3C1B-4413-8418-63644DB3FABA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd652_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6C536B0-32E9-42D0-B298-B4D77CC94914", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd652:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F81E096-820A-4B27-A539-5D3BA39FA5C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd820a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB757118-0F90-4E6E-AD4F-A05A5791B20C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd820a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BCD9420-26A7-4444-9AA4-D7B0AC42FA84", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DFD2C9A-6C25-4B8F-BE64-DAD3DCCDEADD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DE61FCE-CA87-46E1-981D-B44697E54CB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "84289E6D-DA2A-4D04-9DDA-E8C46DDDD056", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0B56360-7AC3-410A-B7F8-1BE8514B3781", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EA0D645-80F6-48C3-AF0D-99198ADC8778", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*", "matchCriteriaId": "814FF3F3-CD5A-45A3-988C-6457D2CEB48C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A02E12AC-F845-4164-9D95-ACD7167B6DD6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*", "matchCriteriaId": "321F7DE7-E6E9-449F-867B-04A9F53334B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F00D854-0AC7-415F-B19A-642CB9F72210", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*", "matchCriteriaId": "F977B432-2709-4D75-AA3E-F440285B7BA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "24D7B67C-6FEC-48F8-9D46-778E4528BC20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "matchCriteriaId": "05006807-D961-446C-B8DC-C87507F1316E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCA6574AU, QCA6584, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820A, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, Snapdragon_High_Med_2016, lack of input validation in WLANWMI command handlers can lead to integer \u0026 heap overflows." }, { "lang": "es", "value": "En Snapdragon (Automobile, Mobile y Wear) en versiones MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCA6574AU, QCA6584, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820A, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660 y Snapdragon_High_Med_2016, la falta de validaci\u00f3n de entradas en los manejadores del comando WLANWMI puede conducir a desbordamiento de memoria din\u00e1mica (heap) de enteros." } ], "id": "CVE-2018-11292", "lastModified": "2024-11-21T03:43:04.800", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-20T13:29:01.823", "references": [ { "source": "product-security@qualcomm.com", "tags": [ "Third Party Advisory" ], "url": "http://support.blackberry.com/kb/articleDetail?language=en_US\u0026articleNumber=000051618" }, { "source": "product-security@qualcomm.com", "tags": [ "Third Party Advisory" ], "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.blackberry.com/kb/articleDetail?language=en_US\u0026articleNumber=000051618" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" } ], "sourceIdentifier": "product-security@qualcomm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" }, { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A960B86A-C397-4ACB-AEE6-55F316D32949", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "matchCriteriaId": "D79B8959-3D1E-4B48-9181-D75FE90AAF98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A35FECFB-60AE-42A8-BCBB-FEA7D5826D49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9765187-8653-4D66-B230-B2CE862AC5C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FD1C359-C79B-4CE8-A192-5AA34D0BF05B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", "matchCriteriaId": "716B747E-672C-4B95-9D8E-1262338E67EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD99C6F-2444-4A5E-A517-0C8023DDF23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D6D6965-B5B2-46D2-8718-43B7B22441C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*", "matchCriteriaId": "E75C7497-A7DC-436B-BACD-71F69D99517D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd212_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AC3A8D2-2860-4A34-B9A8-0077263E4563", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd212:-:*:*:*:*:*:*:*", "matchCriteriaId": "B67ABF7B-5719-4C99-87C4-75499E98A281", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47AB5135-6391-45C1-81DE-803E3834F196", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCEF246C-6B39-4DC2-81B0-040DCAAD5177", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd425_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC5ECC0E-0120-47E5-9D00-440DC38F2C0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd425:-:*:*:*:*:*:*:*", "matchCriteriaId": "352E745F-375B-43AE-9B29-8A2D50C695B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd427_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9CDD792-89BC-4A7B-A971-4C04663E62A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd427:-:*:*:*:*:*:*:*", "matchCriteriaId": "64D6ACA2-47C7-4E44-A838-22600B5BC52E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd430_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6652C54-B207-4816-B70D-5DD2C792D1DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd430:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD3B99CC-CC53-42A6-9C42-0C06E734A554", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd435_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C2951AF-E04B-433B-B327-03D8D28B2BDE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd435:-:*:*:*:*:*:*:*", "matchCriteriaId": "084BB475-8F09-408E-AF1C-D0CA4DD8D414", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd450_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF6EA9F3-ED14-4DAC-93D1-2DF63C7C3EAC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd450:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4EF0B75-2431-4E44-B515-11C9BD4BC982", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd625_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C5E72A3-2117-4190-978F-EFB4DDE4EC9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd625:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EEF23-73EB-49AE-B9F1-4702D545D643", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A83A1CF-396D-403F-AA22-0ED817DD384B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd650:-:*:*:*:*:*:*:*", "matchCriteriaId": "21AEAA09-3C1B-4413-8418-63644DB3FABA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd652_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6C536B0-32E9-42D0-B298-B4D77CC94914", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd652:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F81E096-820A-4B27-A539-5D3BA39FA5C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd820a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB757118-0F90-4E6E-AD4F-A05A5791B20C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd820a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BCD9420-26A7-4444-9AA4-D7B0AC42FA84", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd845_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB222869-9CDB-43B1-8947-954C8C8520B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd845:-:*:*:*:*:*:*:*", "matchCriteriaId": "306DAB18-F737-47DE-A47D-C39F1B25D515", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DFD2C9A-6C25-4B8F-BE64-DAD3DCCDEADD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DE61FCE-CA87-46E1-981D-B44697E54CB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "84289E6D-DA2A-4D04-9DDA-E8C46DDDD056", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0B56360-7AC3-410A-B7F8-1BE8514B3781", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EA0D645-80F6-48C3-AF0D-99198ADC8778", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*", "matchCriteriaId": "814FF3F3-CD5A-45A3-988C-6457D2CEB48C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A02E12AC-F845-4164-9D95-ACD7167B6DD6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*", "matchCriteriaId": "321F7DE7-E6E9-449F-867B-04A9F53334B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F00D854-0AC7-415F-B19A-642CB9F72210", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*", "matchCriteriaId": "F977B432-2709-4D75-AA3E-F440285B7BA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "24D7B67C-6FEC-48F8-9D46-778E4528BC20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "matchCriteriaId": "05006807-D961-446C-B8DC-C87507F1316E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0CE1B23-6FE3-41C4-B264-C7A9E8BDBEC1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*", "matchCriteriaId": "794BA13C-3C63-4695-AA45-676F85D904BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:qca6584_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "95CFB656-804A-453C-A39B-1B08C0A16BB9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:qca6584:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F0C9ED5-27E3-48EC-9A05-862715EE2034", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, QCA6584, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 820A, SD 845, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDX20, Snapdragon_High_Med_2016, MAC address randomization performed during probe requests is not done properly due to a flawed RNG in use." }, { "lang": "es", "value": "En Snapdragon (Automobile, Mobile y Wear) en versiones MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, QCA6584, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 820A, SD 845, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDX20 y Snapdragon_High_Med_2016, la aleatorizaci\u00f3n de direcciones MAC realizada durante las peticiones probe no se realiz\u00f3 correctamente debido al uso de un RGN con errores." } ], "id": "CVE-2018-11290", "lastModified": "2024-11-21T03:43:04.467", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-20T13:29:01.543", "references": [ { "source": "product-security@qualcomm.com", "tags": [ "Not Applicable", "Third Party Advisory" ], "url": "http://support.blackberry.com/kb/articleDetail?language=en_US\u0026articleNumber=000051618" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable", "Third Party Advisory" ], "url": "http://support.blackberry.com/kb/articleDetail?language=en_US\u0026articleNumber=000051618" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" } ], "sourceIdentifier": "product-security@qualcomm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-338" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A960B86A-C397-4ACB-AEE6-55F316D32949", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "matchCriteriaId": "D79B8959-3D1E-4B48-9181-D75FE90AAF98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A35FECFB-60AE-42A8-BCBB-FEA7D5826D49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9765187-8653-4D66-B230-B2CE862AC5C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD99C6F-2444-4A5E-A517-0C8023DDF23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE28A59C-7AA6-4B85-84E8-07852B96108E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DEE828B-09A7-4AC1-8134-491A7C87C118", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D6D6965-B5B2-46D2-8718-43B7B22441C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*", "matchCriteriaId": "E75C7497-A7DC-436B-BACD-71F69D99517D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd212_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AC3A8D2-2860-4A34-B9A8-0077263E4563", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd212:-:*:*:*:*:*:*:*", "matchCriteriaId": "B67ABF7B-5719-4C99-87C4-75499E98A281", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47AB5135-6391-45C1-81DE-803E3834F196", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCEF246C-6B39-4DC2-81B0-040DCAAD5177", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd425_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC5ECC0E-0120-47E5-9D00-440DC38F2C0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd425:-:*:*:*:*:*:*:*", "matchCriteriaId": "352E745F-375B-43AE-9B29-8A2D50C695B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd427_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9CDD792-89BC-4A7B-A971-4C04663E62A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd427:-:*:*:*:*:*:*:*", "matchCriteriaId": "64D6ACA2-47C7-4E44-A838-22600B5BC52E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd430_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6652C54-B207-4816-B70D-5DD2C792D1DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd430:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD3B99CC-CC53-42A6-9C42-0C06E734A554", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd435_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C2951AF-E04B-433B-B327-03D8D28B2BDE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd435:-:*:*:*:*:*:*:*", "matchCriteriaId": "084BB475-8F09-408E-AF1C-D0CA4DD8D414", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd450_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF6EA9F3-ED14-4DAC-93D1-2DF63C7C3EAC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd450:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4EF0B75-2431-4E44-B515-11C9BD4BC982", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd625_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C5E72A3-2117-4190-978F-EFB4DDE4EC9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd625:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EEF23-73EB-49AE-B9F1-4702D545D643", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A83A1CF-396D-403F-AA22-0ED817DD384B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd650:-:*:*:*:*:*:*:*", "matchCriteriaId": "21AEAA09-3C1B-4413-8418-63644DB3FABA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd652_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6C536B0-32E9-42D0-B298-B4D77CC94914", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd652:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F81E096-820A-4B27-A539-5D3BA39FA5C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC508C49-0B76-43A8-B2AF-0F8EB989E238", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd820:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9665200-D306-4EEB-9F42-6C5963524179", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd820a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB757118-0F90-4E6E-AD4F-A05A5791B20C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd820a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BCD9420-26A7-4444-9AA4-D7B0AC42FA84", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DA605FD-B801-43BB-B52D-879013F7F57E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*", "matchCriteriaId": "908BFD96-0423-4AFC-B8F3-105B2D5B4C73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd845_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB222869-9CDB-43B1-8947-954C8C8520B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd845:-:*:*:*:*:*:*:*", "matchCriteriaId": "306DAB18-F737-47DE-A47D-C39F1B25D515", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd850_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1CA3237-5F9A-4490-A66B-853BE9310028", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd850:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8F3601C-A801-4EBD-BDCC-2B84898DFBEA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2326BD7-28A5-4244-8501-B109913E7AE6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*", "matchCriteriaId": "532D244B-8B5A-4923-B7F1-9DC0A5FC0E9D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DFD2C9A-6C25-4B8F-BE64-DAD3DCCDEADD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DE61FCE-CA87-46E1-981D-B44697E54CB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "84289E6D-DA2A-4D04-9DDA-E8C46DDDD056", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0B56360-7AC3-410A-B7F8-1BE8514B3781", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EA0D645-80F6-48C3-AF0D-99198ADC8778", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*", "matchCriteriaId": "814FF3F3-CD5A-45A3-988C-6457D2CEB48C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A02E12AC-F845-4164-9D95-ACD7167B6DD6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*", "matchCriteriaId": "321F7DE7-E6E9-449F-867B-04A9F53334B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F00D854-0AC7-415F-B19A-642CB9F72210", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*", "matchCriteriaId": "F977B432-2709-4D75-AA3E-F440285B7BA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "24D7B67C-6FEC-48F8-9D46-778E4528BC20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "matchCriteriaId": "05006807-D961-446C-B8DC-C87507F1316E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D045BE4B-BC19-4A51-90E6-00C18389C81B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F006960-CDE3-4E74-B4F0-2C4B2CA93959", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016, incorrect control flow implementation in Video while checking buffer sufficiency." }, { "lang": "es", "value": "En Snapdragon (Automobile, Mobile y Wear) en versiones MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710 y Snapdragon_High_Med_2016, hay una implementaci\u00f3n incorrecta del flujo de control en Video al comprobar la suficiencia del b\u00fafer." } ], "id": "CVE-2018-11287", "lastModified": "2024-11-21T03:43:03.690", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-20T13:29:01.403", "references": [ { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" } ], "sourceIdentifier": "product-security@qualcomm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
product-security@qualcomm.com | https://www.qualcomm.com/company/product-security/bulletins | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.qualcomm.com/company/product-security/bulletins | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A960B86A-C397-4ACB-AEE6-55F316D32949", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "matchCriteriaId": "D79B8959-3D1E-4B48-9181-D75FE90AAF98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A35FECFB-60AE-42A8-BCBB-FEA7D5826D49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9765187-8653-4D66-B230-B2CE862AC5C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EF77DD1-BE11-4132-9889-646196FAE567", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB323C15-2018-4CB8-858E-56F088B03FBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FD1C359-C79B-4CE8-A192-5AA34D0BF05B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", "matchCriteriaId": "716B747E-672C-4B95-9D8E-1262338E67EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9645_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "65E5C59A-ABCF-4F62-8C6D-ECDACDAA83C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9645:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F8F856B-70D7-4A1A-8257-90AAAE62CD6F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7AFDBF8-D08A-4C98-B4A4-A4C7049DD05F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*", "matchCriteriaId": "520B217E-C02B-493D-8C11-E155E50357B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE28A59C-7AA6-4B85-84E8-07852B96108E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DEE828B-09A7-4AC1-8134-491A7C87C118", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D6D6965-B5B2-46D2-8718-43B7B22441C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*", "matchCriteriaId": "E75C7497-A7DC-436B-BACD-71F69D99517D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd212_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AC3A8D2-2860-4A34-B9A8-0077263E4563", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd212:-:*:*:*:*:*:*:*", "matchCriteriaId": "B67ABF7B-5719-4C99-87C4-75499E98A281", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47AB5135-6391-45C1-81DE-803E3834F196", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCEF246C-6B39-4DC2-81B0-040DCAAD5177", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd410_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBD160D5-5DE6-4A74-A941-AFC4607C0F67", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd410:-:*:*:*:*:*:*:*", "matchCriteriaId": "C39B97F7-1A96-4773-B46F-88F3DE07DC2D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd412_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A31A926B-2FDD-4642-9B21-AF63DCCC263E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd412:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D2D115F-66D0-4D45-959A-F60AA111356F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd425_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC5ECC0E-0120-47E5-9D00-440DC38F2C0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd425:-:*:*:*:*:*:*:*", "matchCriteriaId": "352E745F-375B-43AE-9B29-8A2D50C695B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd427_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9CDD792-89BC-4A7B-A971-4C04663E62A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd427:-:*:*:*:*:*:*:*", "matchCriteriaId": "64D6ACA2-47C7-4E44-A838-22600B5BC52E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd430_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6652C54-B207-4816-B70D-5DD2C792D1DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd430:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD3B99CC-CC53-42A6-9C42-0C06E734A554", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd435_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C2951AF-E04B-433B-B327-03D8D28B2BDE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd435:-:*:*:*:*:*:*:*", "matchCriteriaId": "084BB475-8F09-408E-AF1C-D0CA4DD8D414", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd450_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF6EA9F3-ED14-4DAC-93D1-2DF63C7C3EAC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd450:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4EF0B75-2431-4E44-B515-11C9BD4BC982", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd615_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "12BB71F6-FABD-423D-AC7D-CA66BCE1A89D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd615:-:*:*:*:*:*:*:*", "matchCriteriaId": "77FB761D-7C87-4A9A-A227-17D5DBE0BDBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd616_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C73516F0-831B-40F0-BAE5-B45660D3507A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd616:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC8F5E3A-2FEF-4713-AC4D-EBAFFD697CE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd415_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "45D289EE-7423-4396-9F32-3D576E72238E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd415:-:*:*:*:*:*:*:*", "matchCriteriaId": "43EA6FCE-2BFD-4588-B793-758BA0308C24", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd617_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F3D690E-908B-49DF-8341-9CFAE6DF5E44", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd617:-:*:*:*:*:*:*:*", "matchCriteriaId": "274F8FC2-F564-4D87-B259-6AB5E035E73E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd625_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C5E72A3-2117-4190-978F-EFB4DDE4EC9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd625:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EEF23-73EB-49AE-B9F1-4702D545D643", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A83A1CF-396D-403F-AA22-0ED817DD384B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd650:-:*:*:*:*:*:*:*", "matchCriteriaId": "21AEAA09-3C1B-4413-8418-63644DB3FABA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd652_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6C536B0-32E9-42D0-B298-B4D77CC94914", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd652:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F81E096-820A-4B27-A539-5D3BA39FA5C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd810_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EA7F1BB-B099-41D3-94A6-196CD4DF2548", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd810:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F00BF76-0D5E-4647-9BB5-0B4B57F64110", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC508C49-0B76-43A8-B2AF-0F8EB989E238", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd820:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9665200-D306-4EEB-9F42-6C5963524179", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DA605FD-B801-43BB-B52D-879013F7F57E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*", "matchCriteriaId": "908BFD96-0423-4AFC-B8F3-105B2D5B4C73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Snapdragon (Mobile, Wear) in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 835, Snapdragon_High_Med_2016, a double free of ASN1 heap memory used for EUTRA CAP container occurs during UTRAN to LTE Capability inquiry procedure." }, { "lang": "es", "value": "En Snapdragon (Mobile y Wear) en versiones MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 835 y Snapdragon_High_Med_2016, ocurre una doble liberaci\u00f3n (double free) de la memoria din\u00e1mica (heap) de ASN1 empleada para el contenedor EUTRA CAP durante el procedimiento de consulta UTRAN to LTE Capability." } ], "id": "CVE-2018-11982", "lastModified": "2024-11-21T03:44:21.940", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-20T13:29:02.057", "references": [ { "source": "product-security@qualcomm.com", "tags": [ "Third Party Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" } ], "sourceIdentifier": "product-security@qualcomm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-415" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
qualcomm | msm8909w_firmware | - | |
qualcomm | msm8909w | - | |
qualcomm | msm8996au_firmware | - | |
qualcomm | msm8996au | - | |
qualcomm | sd210_firmware | - | |
qualcomm | sd210 | - | |
qualcomm | sd212_firmware | - | |
qualcomm | sd212 | - | |
qualcomm | sd205_firmware | - | |
qualcomm | sd205 | - | |
qualcomm | sd430_firmware | - | |
qualcomm | sd430 | - | |
qualcomm | sd450_firmware | - | |
qualcomm | sd450 | - | |
qualcomm | sd615_firmware | - | |
qualcomm | sd615 | - | |
qualcomm | sd616_firmware | - | |
qualcomm | sd616 | - | |
qualcomm | sd415_firmware | - | |
qualcomm | sd415 | - | |
qualcomm | sd617_firmware | - | |
qualcomm | sd617 | - | |
qualcomm | sd625_firmware | - | |
qualcomm | sd625 | - | |
qualcomm | sd650_firmware | - | |
qualcomm | sd650 | - | |
qualcomm | sd652_firmware | - | |
qualcomm | sd652 | - | |
qualcomm | sd810_firmware | - | |
qualcomm | sd810 | - | |
qualcomm | sd820_firmware | - | |
qualcomm | sd820 | - | |
qualcomm | sd820a_firmware | - | |
qualcomm | sd820a | - | |
qualcomm | sd835_firmware | - | |
qualcomm | sd835 | - | |
qualcomm | sd845_firmware | - | |
qualcomm | sd845 | - | |
qualcomm | sda660_firmware | - | |
qualcomm | sda660 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE28A59C-7AA6-4B85-84E8-07852B96108E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DEE828B-09A7-4AC1-8134-491A7C87C118", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D6D6965-B5B2-46D2-8718-43B7B22441C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*", "matchCriteriaId": "E75C7497-A7DC-436B-BACD-71F69D99517D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd212_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AC3A8D2-2860-4A34-B9A8-0077263E4563", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd212:-:*:*:*:*:*:*:*", "matchCriteriaId": "B67ABF7B-5719-4C99-87C4-75499E98A281", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47AB5135-6391-45C1-81DE-803E3834F196", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCEF246C-6B39-4DC2-81B0-040DCAAD5177", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd430_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6652C54-B207-4816-B70D-5DD2C792D1DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd430:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD3B99CC-CC53-42A6-9C42-0C06E734A554", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd450_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF6EA9F3-ED14-4DAC-93D1-2DF63C7C3EAC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd450:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4EF0B75-2431-4E44-B515-11C9BD4BC982", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd615_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "12BB71F6-FABD-423D-AC7D-CA66BCE1A89D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd615:-:*:*:*:*:*:*:*", "matchCriteriaId": "77FB761D-7C87-4A9A-A227-17D5DBE0BDBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd616_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C73516F0-831B-40F0-BAE5-B45660D3507A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd616:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC8F5E3A-2FEF-4713-AC4D-EBAFFD697CE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd415_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "45D289EE-7423-4396-9F32-3D576E72238E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd415:-:*:*:*:*:*:*:*", "matchCriteriaId": "43EA6FCE-2BFD-4588-B793-758BA0308C24", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd617_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F3D690E-908B-49DF-8341-9CFAE6DF5E44", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd617:-:*:*:*:*:*:*:*", "matchCriteriaId": "274F8FC2-F564-4D87-B259-6AB5E035E73E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd625_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C5E72A3-2117-4190-978F-EFB4DDE4EC9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd625:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EEF23-73EB-49AE-B9F1-4702D545D643", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A83A1CF-396D-403F-AA22-0ED817DD384B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd650:-:*:*:*:*:*:*:*", "matchCriteriaId": "21AEAA09-3C1B-4413-8418-63644DB3FABA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd652_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6C536B0-32E9-42D0-B298-B4D77CC94914", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd652:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F81E096-820A-4B27-A539-5D3BA39FA5C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd810_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EA7F1BB-B099-41D3-94A6-196CD4DF2548", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd810:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F00BF76-0D5E-4647-9BB5-0B4B57F64110", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC508C49-0B76-43A8-B2AF-0F8EB989E238", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd820:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9665200-D306-4EEB-9F42-6C5963524179", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd820a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB757118-0F90-4E6E-AD4F-A05A5791B20C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd820a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BCD9420-26A7-4444-9AA4-D7B0AC42FA84", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DA605FD-B801-43BB-B52D-879013F7F57E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*", "matchCriteriaId": "908BFD96-0423-4AFC-B8F3-105B2D5B4C73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd845_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB222869-9CDB-43B1-8947-954C8C8520B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd845:-:*:*:*:*:*:*:*", "matchCriteriaId": "306DAB18-F737-47DE-A47D-C39F1B25D515", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2326BD7-28A5-4244-8501-B109913E7AE6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*", "matchCriteriaId": "532D244B-8B5A-4923-B7F1-9DC0A5FC0E9D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SDA660, the com.qualcomm.embms is a vendor package deployed in the system image which has an inadequate permission level and allows any application installed from Play Store to request this permission at install-time. The system application interfaces with the Radio Interface Layer leading to potential access control issue." }, { "lang": "es", "value": "En Snapdragon (Automobile, Mobile y Wear) en versiones MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845 y SDA660, com.qualcomm.embms es un paquete del fabricante desplegado en la imagen del sistema que tiene un nivel de permisos inadecuado y permite que cualquier aplicaci\u00f3n instalada de la Play Store solicite este permiso en tiempo de instalaci\u00f3n. La aplicaci\u00f3n del sistema interfiere con Radio Interface Layer, lo que conduce a un potencial problema de control de acceso." } ], "id": "CVE-2018-11277", "lastModified": "2024-11-21T03:43:02.667", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-20T13:29:01.167", "references": [ { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" } ], "sourceIdentifier": "product-security@qualcomm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
product-security@qualcomm.com | http://www.securityfocus.com/bid/106128 | Third Party Advisory, VDB Entry | |
product-security@qualcomm.com | https://www.qualcomm.com/company/product-security/bulletins | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106128 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.qualcomm.com/company/product-security/bulletins | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A960B86A-C397-4ACB-AEE6-55F316D32949", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "matchCriteriaId": "D79B8959-3D1E-4B48-9181-D75FE90AAF98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A35FECFB-60AE-42A8-BCBB-FEA7D5826D49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9765187-8653-4D66-B230-B2CE862AC5C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9615_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "71E28EA6-0683-4755-8ABB-7F37DA810E4F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9615:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4DF4D4E-CDAA-42BB-802E-2722E7F3DBC2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FD1C359-C79B-4CE8-A192-5AA34D0BF05B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", "matchCriteriaId": "716B747E-672C-4B95-9D8E-1262338E67EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD99C6F-2444-4A5E-A517-0C8023DDF23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7AFDBF8-D08A-4C98-B4A4-A4C7049DD05F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*", "matchCriteriaId": "520B217E-C02B-493D-8C11-E155E50357B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D6D6965-B5B2-46D2-8718-43B7B22441C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*", "matchCriteriaId": "E75C7497-A7DC-436B-BACD-71F69D99517D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd212_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AC3A8D2-2860-4A34-B9A8-0077263E4563", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd212:-:*:*:*:*:*:*:*", "matchCriteriaId": "B67ABF7B-5719-4C99-87C4-75499E98A281", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47AB5135-6391-45C1-81DE-803E3834F196", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCEF246C-6B39-4DC2-81B0-040DCAAD5177", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd410_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBD160D5-5DE6-4A74-A941-AFC4607C0F67", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd410:-:*:*:*:*:*:*:*", "matchCriteriaId": "C39B97F7-1A96-4773-B46F-88F3DE07DC2D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd412_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A31A926B-2FDD-4642-9B21-AF63DCCC263E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd412:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D2D115F-66D0-4D45-959A-F60AA111356F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd425_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC5ECC0E-0120-47E5-9D00-440DC38F2C0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd425:-:*:*:*:*:*:*:*", "matchCriteriaId": "352E745F-375B-43AE-9B29-8A2D50C695B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd427_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9CDD792-89BC-4A7B-A971-4C04663E62A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd427:-:*:*:*:*:*:*:*", "matchCriteriaId": "64D6ACA2-47C7-4E44-A838-22600B5BC52E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd430_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6652C54-B207-4816-B70D-5DD2C792D1DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd430:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD3B99CC-CC53-42A6-9C42-0C06E734A554", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd435_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C2951AF-E04B-433B-B327-03D8D28B2BDE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd435:-:*:*:*:*:*:*:*", "matchCriteriaId": "084BB475-8F09-408E-AF1C-D0CA4DD8D414", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd450_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF6EA9F3-ED14-4DAC-93D1-2DF63C7C3EAC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd450:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4EF0B75-2431-4E44-B515-11C9BD4BC982", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "02C15AB0-3D65-4B52-81CE-9CBBDAC7829E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd600:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B647CB7-B228-40A3-9F79-018DF125A883", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd615_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "12BB71F6-FABD-423D-AC7D-CA66BCE1A89D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd615:-:*:*:*:*:*:*:*", "matchCriteriaId": "77FB761D-7C87-4A9A-A227-17D5DBE0BDBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd616_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C73516F0-831B-40F0-BAE5-B45660D3507A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd616:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC8F5E3A-2FEF-4713-AC4D-EBAFFD697CE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd415_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "45D289EE-7423-4396-9F32-3D576E72238E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd415:-:*:*:*:*:*:*:*", "matchCriteriaId": "43EA6FCE-2BFD-4588-B793-758BA0308C24", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd617_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F3D690E-908B-49DF-8341-9CFAE6DF5E44", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd617:-:*:*:*:*:*:*:*", "matchCriteriaId": "274F8FC2-F564-4D87-B259-6AB5E035E73E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd625_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C5E72A3-2117-4190-978F-EFB4DDE4EC9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd625:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EEF23-73EB-49AE-B9F1-4702D545D643", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A83A1CF-396D-403F-AA22-0ED817DD384B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd650:-:*:*:*:*:*:*:*", "matchCriteriaId": "21AEAA09-3C1B-4413-8418-63644DB3FABA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd652_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6C536B0-32E9-42D0-B298-B4D77CC94914", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd652:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F81E096-820A-4B27-A539-5D3BA39FA5C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC508C49-0B76-43A8-B2AF-0F8EB989E238", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd820:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9665200-D306-4EEB-9F42-6C5963524179", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd820a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB757118-0F90-4E6E-AD4F-A05A5791B20C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd820a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BCD9420-26A7-4444-9AA4-D7B0AC42FA84", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DA605FD-B801-43BB-B52D-879013F7F57E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*", "matchCriteriaId": "908BFD96-0423-4AFC-B8F3-105B2D5B4C73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd845_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB222869-9CDB-43B1-8947-954C8C8520B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd845:-:*:*:*:*:*:*:*", "matchCriteriaId": "306DAB18-F737-47DE-A47D-C39F1B25D515", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd850_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1CA3237-5F9A-4490-A66B-853BE9310028", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd850:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8F3601C-A801-4EBD-BDCC-2B84898DFBEA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2326BD7-28A5-4244-8501-B109913E7AE6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*", "matchCriteriaId": "532D244B-8B5A-4923-B7F1-9DC0A5FC0E9D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DFD2C9A-6C25-4B8F-BE64-DAD3DCCDEADD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DE61FCE-CA87-46E1-981D-B44697E54CB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "84289E6D-DA2A-4D04-9DDA-E8C46DDDD056", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0B56360-7AC3-410A-B7F8-1BE8514B3781", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EA0D645-80F6-48C3-AF0D-99198ADC8778", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*", "matchCriteriaId": "814FF3F3-CD5A-45A3-988C-6457D2CEB48C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A02E12AC-F845-4164-9D95-ACD7167B6DD6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*", "matchCriteriaId": "321F7DE7-E6E9-449F-867B-04A9F53334B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F00D854-0AC7-415F-B19A-642CB9F72210", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*", "matchCriteriaId": "F977B432-2709-4D75-AA3E-F440285B7BA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "24D7B67C-6FEC-48F8-9D46-778E4528BC20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "matchCriteriaId": "05006807-D961-446C-B8DC-C87507F1316E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0CE1B23-6FE3-41C4-B264-C7A9E8BDBEC1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*", "matchCriteriaId": "794BA13C-3C63-4695-AA45-676F85D904BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:snapdragon_high_med_2016_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "706B5BF5-3803-4D3C-8A3B-34D30D8B36F9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:snapdragon_high_med_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "C69745BA-DE6A-4646-959D-C45166559952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9615, MDM9640, MDM9650, MDM9655, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 600, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDX20, Snapdragon_High_Med_2016, when sending an malformed XML data to deviceprogrammer/firehose it may do an out of bounds buffer write allowing a region of memory to be filled with 0x20." }, { "lang": "es", "value": "En Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9615, MDM9640, MDM9650, MDM9655, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 600, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDX20 y Snapdragon_High_Med_2016, al enviar datos XML mal formados a deviceprogrammer/firehose se podr\u00eda provocar una escritura al b\u00fafer fuera de l\u00edmites, lo que permitir\u00eda que se escriba en una regi\u00f3n de memoria con 0x20." } ], "id": "CVE-2018-11267", "lastModified": "2024-11-21T03:43:01.500", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-20T13:29:00.807", "references": [ { "source": "product-security@qualcomm.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106128" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" } ], "sourceIdentifier": "product-security@qualcomm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-129" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
product-security@qualcomm.com | http://www.securityfocus.com/bid/105838 | Third Party Advisory, VDB Entry | |
product-security@qualcomm.com | https://www.qualcomm.com/company/product-security/bulletins | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/105838 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.qualcomm.com/company/product-security/bulletins | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A960B86A-C397-4ACB-AEE6-55F316D32949", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "matchCriteriaId": "D79B8959-3D1E-4B48-9181-D75FE90AAF98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A35FECFB-60AE-42A8-BCBB-FEA7D5826D49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9765187-8653-4D66-B230-B2CE862AC5C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EF77DD1-BE11-4132-9889-646196FAE567", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB323C15-2018-4CB8-858E-56F088B03FBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FD1C359-C79B-4CE8-A192-5AA34D0BF05B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", "matchCriteriaId": "716B747E-672C-4B95-9D8E-1262338E67EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9645_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "65E5C59A-ABCF-4F62-8C6D-ECDACDAA83C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9645:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F8F856B-70D7-4A1A-8257-90AAAE62CD6F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD99C6F-2444-4A5E-A517-0C8023DDF23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7AFDBF8-D08A-4C98-B4A4-A4C7049DD05F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*", "matchCriteriaId": "520B217E-C02B-493D-8C11-E155E50357B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE28A59C-7AA6-4B85-84E8-07852B96108E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DEE828B-09A7-4AC1-8134-491A7C87C118", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D6D6965-B5B2-46D2-8718-43B7B22441C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*", "matchCriteriaId": "E75C7497-A7DC-436B-BACD-71F69D99517D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd212_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AC3A8D2-2860-4A34-B9A8-0077263E4563", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd212:-:*:*:*:*:*:*:*", "matchCriteriaId": "B67ABF7B-5719-4C99-87C4-75499E98A281", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47AB5135-6391-45C1-81DE-803E3834F196", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCEF246C-6B39-4DC2-81B0-040DCAAD5177", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd425_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC5ECC0E-0120-47E5-9D00-440DC38F2C0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd425:-:*:*:*:*:*:*:*", "matchCriteriaId": "352E745F-375B-43AE-9B29-8A2D50C695B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd427_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9CDD792-89BC-4A7B-A971-4C04663E62A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd427:-:*:*:*:*:*:*:*", "matchCriteriaId": "64D6ACA2-47C7-4E44-A838-22600B5BC52E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd430_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6652C54-B207-4816-B70D-5DD2C792D1DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd430:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD3B99CC-CC53-42A6-9C42-0C06E734A554", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd435_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C2951AF-E04B-433B-B327-03D8D28B2BDE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd435:-:*:*:*:*:*:*:*", "matchCriteriaId": "084BB475-8F09-408E-AF1C-D0CA4DD8D414", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd450_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF6EA9F3-ED14-4DAC-93D1-2DF63C7C3EAC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd450:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4EF0B75-2431-4E44-B515-11C9BD4BC982", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd625_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C5E72A3-2117-4190-978F-EFB4DDE4EC9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd625:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EEF23-73EB-49AE-B9F1-4702D545D643", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A83A1CF-396D-403F-AA22-0ED817DD384B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd650:-:*:*:*:*:*:*:*", "matchCriteriaId": "21AEAA09-3C1B-4413-8418-63644DB3FABA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd652_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6C536B0-32E9-42D0-B298-B4D77CC94914", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd652:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F81E096-820A-4B27-A539-5D3BA39FA5C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd810_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EA7F1BB-B099-41D3-94A6-196CD4DF2548", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd810:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F00BF76-0D5E-4647-9BB5-0B4B57F64110", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC508C49-0B76-43A8-B2AF-0F8EB989E238", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd820:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9665200-D306-4EEB-9F42-6C5963524179", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd820a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB757118-0F90-4E6E-AD4F-A05A5791B20C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd820a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BCD9420-26A7-4444-9AA4-D7B0AC42FA84", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DA605FD-B801-43BB-B52D-879013F7F57E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*", "matchCriteriaId": "908BFD96-0423-4AFC-B8F3-105B2D5B4C73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd845_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB222869-9CDB-43B1-8947-954C8C8520B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd845:-:*:*:*:*:*:*:*", "matchCriteriaId": "306DAB18-F737-47DE-A47D-C39F1B25D515", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd850_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1CA3237-5F9A-4490-A66B-853BE9310028", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd850:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8F3601C-A801-4EBD-BDCC-2B84898DFBEA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2326BD7-28A5-4244-8501-B109913E7AE6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*", "matchCriteriaId": "532D244B-8B5A-4923-B7F1-9DC0A5FC0E9D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DFD2C9A-6C25-4B8F-BE64-DAD3DCCDEADD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DE61FCE-CA87-46E1-981D-B44697E54CB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "84289E6D-DA2A-4D04-9DDA-E8C46DDDD056", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0B56360-7AC3-410A-B7F8-1BE8514B3781", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EA0D645-80F6-48C3-AF0D-99198ADC8778", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*", "matchCriteriaId": "814FF3F3-CD5A-45A3-988C-6457D2CEB48C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A02E12AC-F845-4164-9D95-ACD7167B6DD6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*", "matchCriteriaId": "321F7DE7-E6E9-449F-867B-04A9F53334B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F00D854-0AC7-415F-B19A-642CB9F72210", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*", "matchCriteriaId": "F977B432-2709-4D75-AA3E-F440285B7BA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "24D7B67C-6FEC-48F8-9D46-778E4528BC20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "matchCriteriaId": "05006807-D961-446C-B8DC-C87507F1316E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D045BE4B-BC19-4A51-90E6-00C18389C81B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F006960-CDE3-4E74-B4F0-2C4B2CA93959", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0CE1B23-6FE3-41C4-B264-C7A9E8BDBEC1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*", "matchCriteriaId": "794BA13C-3C63-4695-AA45-676F85D904BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20, Snapdragon_High_Med_2016, a potential buffer overflow exists when parsing TFTP options." }, { "lang": "es", "value": "En Snapdragon (Automobile, Mobile y Wear) en versiones MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20 y Snapdragon_High_Med_2016, existe un potencial desbordamiento de b\u00fafer al analizar opciones TFTP." } ], "id": "CVE-2018-11269", "lastModified": "2024-11-21T03:43:01.800", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-20T13:29:01.043", "references": [ { "source": "product-security@qualcomm.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105838" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105838" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" } ], "sourceIdentifier": "product-security@qualcomm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-129" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A960B86A-C397-4ACB-AEE6-55F316D32949", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "matchCriteriaId": "D79B8959-3D1E-4B48-9181-D75FE90AAF98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A35FECFB-60AE-42A8-BCBB-FEA7D5826D49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9765187-8653-4D66-B230-B2CE862AC5C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FD1C359-C79B-4CE8-A192-5AA34D0BF05B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", "matchCriteriaId": "716B747E-672C-4B95-9D8E-1262338E67EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD99C6F-2444-4A5E-A517-0C8023DDF23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D6D6965-B5B2-46D2-8718-43B7B22441C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*", "matchCriteriaId": "E75C7497-A7DC-436B-BACD-71F69D99517D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd212_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AC3A8D2-2860-4A34-B9A8-0077263E4563", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd212:-:*:*:*:*:*:*:*", "matchCriteriaId": "B67ABF7B-5719-4C99-87C4-75499E98A281", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47AB5135-6391-45C1-81DE-803E3834F196", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCEF246C-6B39-4DC2-81B0-040DCAAD5177", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd425_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC5ECC0E-0120-47E5-9D00-440DC38F2C0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd425:-:*:*:*:*:*:*:*", "matchCriteriaId": "352E745F-375B-43AE-9B29-8A2D50C695B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd427_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9CDD792-89BC-4A7B-A971-4C04663E62A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd427:-:*:*:*:*:*:*:*", "matchCriteriaId": "64D6ACA2-47C7-4E44-A838-22600B5BC52E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd430_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6652C54-B207-4816-B70D-5DD2C792D1DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd430:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD3B99CC-CC53-42A6-9C42-0C06E734A554", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd435_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C2951AF-E04B-433B-B327-03D8D28B2BDE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd435:-:*:*:*:*:*:*:*", "matchCriteriaId": "084BB475-8F09-408E-AF1C-D0CA4DD8D414", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd450_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF6EA9F3-ED14-4DAC-93D1-2DF63C7C3EAC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd450:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4EF0B75-2431-4E44-B515-11C9BD4BC982", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd615_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "12BB71F6-FABD-423D-AC7D-CA66BCE1A89D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd615:-:*:*:*:*:*:*:*", "matchCriteriaId": "77FB761D-7C87-4A9A-A227-17D5DBE0BDBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd616_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C73516F0-831B-40F0-BAE5-B45660D3507A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd616:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC8F5E3A-2FEF-4713-AC4D-EBAFFD697CE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd415_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "45D289EE-7423-4396-9F32-3D576E72238E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd415:-:*:*:*:*:*:*:*", "matchCriteriaId": "43EA6FCE-2BFD-4588-B793-758BA0308C24", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A83A1CF-396D-403F-AA22-0ED817DD384B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd650:-:*:*:*:*:*:*:*", "matchCriteriaId": "21AEAA09-3C1B-4413-8418-63644DB3FABA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd652_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6C536B0-32E9-42D0-B298-B4D77CC94914", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd652:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F81E096-820A-4B27-A539-5D3BA39FA5C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd820a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB757118-0F90-4E6E-AD4F-A05A5791B20C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd820a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BCD9420-26A7-4444-9AA4-D7B0AC42FA84", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DA605FD-B801-43BB-B52D-879013F7F57E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*", "matchCriteriaId": "908BFD96-0423-4AFC-B8F3-105B2D5B4C73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd845_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB222869-9CDB-43B1-8947-954C8C8520B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd845:-:*:*:*:*:*:*:*", "matchCriteriaId": "306DAB18-F737-47DE-A47D-C39F1B25D515", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd850_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1CA3237-5F9A-4490-A66B-853BE9310028", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd850:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8F3601C-A801-4EBD-BDCC-2B84898DFBEA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2326BD7-28A5-4244-8501-B109913E7AE6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*", "matchCriteriaId": "532D244B-8B5A-4923-B7F1-9DC0A5FC0E9D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DFD2C9A-6C25-4B8F-BE64-DAD3DCCDEADD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DE61FCE-CA87-46E1-981D-B44697E54CB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "84289E6D-DA2A-4D04-9DDA-E8C46DDDD056", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0B56360-7AC3-410A-B7F8-1BE8514B3781", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EA0D645-80F6-48C3-AF0D-99198ADC8778", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*", "matchCriteriaId": "814FF3F3-CD5A-45A3-988C-6457D2CEB48C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A02E12AC-F845-4164-9D95-ACD7167B6DD6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*", "matchCriteriaId": "321F7DE7-E6E9-449F-867B-04A9F53334B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F00D854-0AC7-415F-B19A-642CB9F72210", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*", "matchCriteriaId": "F977B432-2709-4D75-AA3E-F440285B7BA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "24D7B67C-6FEC-48F8-9D46-778E4528BC20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "matchCriteriaId": "05006807-D961-446C-B8DC-C87507F1316E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D045BE4B-BC19-4A51-90E6-00C18389C81B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F006960-CDE3-4E74-B4F0-2C4B2CA93959", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016, MAC address randomization performed during probe requests (for privacy reasons) is not done properly due to a flawed RNG which produces repeating output much earlier than expected." }, { "lang": "es", "value": "En Snapdragon (Automobile, Mobile y Wear) en versiones MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710 y Snapdragon_High_Med_2016, la aleatorizaci\u00f3n de direcciones MAC realizada durante las peticiones probe (por razones de privacidad) no se realiz\u00f3 correctamente debido al uso de un RGN con errores, lo cual produc\u00eda salidas repetidas antes de lo esperado." } ], "id": "CVE-2018-5871", "lastModified": "2024-11-21T04:09:35.340", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-20T13:29:02.323", "references": [ { "source": "product-security@qualcomm.com", "tags": [ "Third Party Advisory" ], "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" } ], "sourceIdentifier": "product-security@qualcomm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-338" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A960B86A-C397-4ACB-AEE6-55F316D32949", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "matchCriteriaId": "D79B8959-3D1E-4B48-9181-D75FE90AAF98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A35FECFB-60AE-42A8-BCBB-FEA7D5826D49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9765187-8653-4D66-B230-B2CE862AC5C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD99C6F-2444-4A5E-A517-0C8023DDF23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE28A59C-7AA6-4B85-84E8-07852B96108E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DEE828B-09A7-4AC1-8134-491A7C87C118", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D6D6965-B5B2-46D2-8718-43B7B22441C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*", "matchCriteriaId": "E75C7497-A7DC-436B-BACD-71F69D99517D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd212_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AC3A8D2-2860-4A34-B9A8-0077263E4563", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd212:-:*:*:*:*:*:*:*", "matchCriteriaId": "B67ABF7B-5719-4C99-87C4-75499E98A281", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47AB5135-6391-45C1-81DE-803E3834F196", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCEF246C-6B39-4DC2-81B0-040DCAAD5177", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd425_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC5ECC0E-0120-47E5-9D00-440DC38F2C0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd425:-:*:*:*:*:*:*:*", "matchCriteriaId": "352E745F-375B-43AE-9B29-8A2D50C695B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd427_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9CDD792-89BC-4A7B-A971-4C04663E62A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd427:-:*:*:*:*:*:*:*", "matchCriteriaId": "64D6ACA2-47C7-4E44-A838-22600B5BC52E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd430_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6652C54-B207-4816-B70D-5DD2C792D1DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd430:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD3B99CC-CC53-42A6-9C42-0C06E734A554", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd435_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C2951AF-E04B-433B-B327-03D8D28B2BDE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd435:-:*:*:*:*:*:*:*", "matchCriteriaId": "084BB475-8F09-408E-AF1C-D0CA4DD8D414", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd450_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF6EA9F3-ED14-4DAC-93D1-2DF63C7C3EAC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd450:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4EF0B75-2431-4E44-B515-11C9BD4BC982", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd615_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "12BB71F6-FABD-423D-AC7D-CA66BCE1A89D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd615:-:*:*:*:*:*:*:*", "matchCriteriaId": "77FB761D-7C87-4A9A-A227-17D5DBE0BDBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd616_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C73516F0-831B-40F0-BAE5-B45660D3507A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd616:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC8F5E3A-2FEF-4713-AC4D-EBAFFD697CE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd415_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "45D289EE-7423-4396-9F32-3D576E72238E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd415:-:*:*:*:*:*:*:*", "matchCriteriaId": "43EA6FCE-2BFD-4588-B793-758BA0308C24", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd625_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C5E72A3-2117-4190-978F-EFB4DDE4EC9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd625:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EEF23-73EB-49AE-B9F1-4702D545D643", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A83A1CF-396D-403F-AA22-0ED817DD384B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd650:-:*:*:*:*:*:*:*", "matchCriteriaId": "21AEAA09-3C1B-4413-8418-63644DB3FABA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd625_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C5E72A3-2117-4190-978F-EFB4DDE4EC9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd625:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EEF23-73EB-49AE-B9F1-4702D545D643", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd810_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EA7F1BB-B099-41D3-94A6-196CD4DF2548", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd810:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F00BF76-0D5E-4647-9BB5-0B4B57F64110", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC508C49-0B76-43A8-B2AF-0F8EB989E238", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd820:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9665200-D306-4EEB-9F42-6C5963524179", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd820a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB757118-0F90-4E6E-AD4F-A05A5791B20C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd820a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BCD9420-26A7-4444-9AA4-D7B0AC42FA84", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DA605FD-B801-43BB-B52D-879013F7F57E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*", "matchCriteriaId": "908BFD96-0423-4AFC-B8F3-105B2D5B4C73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd845_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB222869-9CDB-43B1-8947-954C8C8520B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd845:-:*:*:*:*:*:*:*", "matchCriteriaId": "306DAB18-F737-47DE-A47D-C39F1B25D515", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2326BD7-28A5-4244-8501-B109913E7AE6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*", "matchCriteriaId": "532D244B-8B5A-4923-B7F1-9DC0A5FC0E9D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DFD2C9A-6C25-4B8F-BE64-DAD3DCCDEADD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DE61FCE-CA87-46E1-981D-B44697E54CB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "84289E6D-DA2A-4D04-9DDA-E8C46DDDD056", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0B56360-7AC3-410A-B7F8-1BE8514B3781", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EA0D645-80F6-48C3-AF0D-99198ADC8778", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*", "matchCriteriaId": "814FF3F3-CD5A-45A3-988C-6457D2CEB48C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A02E12AC-F845-4164-9D95-ACD7167B6DD6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*", "matchCriteriaId": "321F7DE7-E6E9-449F-867B-04A9F53334B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F00D854-0AC7-415F-B19A-642CB9F72210", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*", "matchCriteriaId": "F977B432-2709-4D75-AA3E-F440285B7BA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "24D7B67C-6FEC-48F8-9D46-778E4528BC20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "matchCriteriaId": "05006807-D961-446C-B8DC-C87507F1316E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D045BE4B-BC19-4A51-90E6-00C18389C81B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F006960-CDE3-4E74-B4F0-2C4B2CA93959", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0CE1B23-6FE3-41C4-B264-C7A9E8BDBEC1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*", "matchCriteriaId": "794BA13C-3C63-4695-AA45-676F85D904BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20, Snapdragon_High_Med_2016, while parsing FLAC file with corrupted picture block, a buffer over-read can occur." }, { "lang": "es", "value": "En Snapdragon (Automobile, Mobile y Wear) en versiones MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20 y Snapdragon_High_Med_2016, puede ocurrir una sobrelectura de b\u00fafer al analizar un archivo FLAC con un bloque de imagen corrupto." } ], "id": "CVE-2018-11285", "lastModified": "2024-11-21T03:43:03.447", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-20T13:29:01.260", "references": [ { "source": "product-security@qualcomm.com", "tags": [ "Third Party Advisory" ], "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" } ], "sourceIdentifier": "product-security@qualcomm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
product-security@qualcomm.com | http://www.securityfocus.com/bid/106845 | Third Party Advisory, VDB Entry | |
product-security@qualcomm.com | https://www.qualcomm.com/company/product-security/bulletins | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106845 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.qualcomm.com/company/product-security/bulletins | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A960B86A-C397-4ACB-AEE6-55F316D32949", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "matchCriteriaId": "D79B8959-3D1E-4B48-9181-D75FE90AAF98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A35FECFB-60AE-42A8-BCBB-FEA7D5826D49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9765187-8653-4D66-B230-B2CE862AC5C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EF77DD1-BE11-4132-9889-646196FAE567", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB323C15-2018-4CB8-858E-56F088B03FBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FD1C359-C79B-4CE8-A192-5AA34D0BF05B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", "matchCriteriaId": "716B747E-672C-4B95-9D8E-1262338E67EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9645_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "65E5C59A-ABCF-4F62-8C6D-ECDACDAA83C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9645:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F8F856B-70D7-4A1A-8257-90AAAE62CD6F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD99C6F-2444-4A5E-A517-0C8023DDF23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7AFDBF8-D08A-4C98-B4A4-A4C7049DD05F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*", "matchCriteriaId": "520B217E-C02B-493D-8C11-E155E50357B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE28A59C-7AA6-4B85-84E8-07852B96108E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DEE828B-09A7-4AC1-8134-491A7C87C118", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D6D6965-B5B2-46D2-8718-43B7B22441C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*", "matchCriteriaId": "E75C7497-A7DC-436B-BACD-71F69D99517D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd212_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AC3A8D2-2860-4A34-B9A8-0077263E4563", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd212:-:*:*:*:*:*:*:*", "matchCriteriaId": "B67ABF7B-5719-4C99-87C4-75499E98A281", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47AB5135-6391-45C1-81DE-803E3834F196", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCEF246C-6B39-4DC2-81B0-040DCAAD5177", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd425_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC5ECC0E-0120-47E5-9D00-440DC38F2C0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd425:-:*:*:*:*:*:*:*", "matchCriteriaId": "352E745F-375B-43AE-9B29-8A2D50C695B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd427_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9CDD792-89BC-4A7B-A971-4C04663E62A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd427:-:*:*:*:*:*:*:*", "matchCriteriaId": "64D6ACA2-47C7-4E44-A838-22600B5BC52E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd430_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6652C54-B207-4816-B70D-5DD2C792D1DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd430:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD3B99CC-CC53-42A6-9C42-0C06E734A554", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd435_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C2951AF-E04B-433B-B327-03D8D28B2BDE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd435:-:*:*:*:*:*:*:*", "matchCriteriaId": "084BB475-8F09-408E-AF1C-D0CA4DD8D414", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd450_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF6EA9F3-ED14-4DAC-93D1-2DF63C7C3EAC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd450:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4EF0B75-2431-4E44-B515-11C9BD4BC982", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd625_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C5E72A3-2117-4190-978F-EFB4DDE4EC9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd625:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EEF23-73EB-49AE-B9F1-4702D545D643", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A83A1CF-396D-403F-AA22-0ED817DD384B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd650:-:*:*:*:*:*:*:*", "matchCriteriaId": "21AEAA09-3C1B-4413-8418-63644DB3FABA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd652_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6C536B0-32E9-42D0-B298-B4D77CC94914", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd652:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F81E096-820A-4B27-A539-5D3BA39FA5C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd810_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EA7F1BB-B099-41D3-94A6-196CD4DF2548", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd810:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F00BF76-0D5E-4647-9BB5-0B4B57F64110", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC508C49-0B76-43A8-B2AF-0F8EB989E238", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd820:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9665200-D306-4EEB-9F42-6C5963524179", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd820a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB757118-0F90-4E6E-AD4F-A05A5791B20C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd820a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BCD9420-26A7-4444-9AA4-D7B0AC42FA84", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DA605FD-B801-43BB-B52D-879013F7F57E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*", "matchCriteriaId": "908BFD96-0423-4AFC-B8F3-105B2D5B4C73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd845_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB222869-9CDB-43B1-8947-954C8C8520B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd845:-:*:*:*:*:*:*:*", "matchCriteriaId": "306DAB18-F737-47DE-A47D-C39F1B25D515", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd850_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1CA3237-5F9A-4490-A66B-853BE9310028", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd850:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8F3601C-A801-4EBD-BDCC-2B84898DFBEA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2326BD7-28A5-4244-8501-B109913E7AE6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*", "matchCriteriaId": "532D244B-8B5A-4923-B7F1-9DC0A5FC0E9D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DFD2C9A-6C25-4B8F-BE64-DAD3DCCDEADD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DE61FCE-CA87-46E1-981D-B44697E54CB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "84289E6D-DA2A-4D04-9DDA-E8C46DDDD056", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0B56360-7AC3-410A-B7F8-1BE8514B3781", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EA0D645-80F6-48C3-AF0D-99198ADC8778", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*", "matchCriteriaId": "814FF3F3-CD5A-45A3-988C-6457D2CEB48C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A02E12AC-F845-4164-9D95-ACD7167B6DD6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*", "matchCriteriaId": "321F7DE7-E6E9-449F-867B-04A9F53334B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F00D854-0AC7-415F-B19A-642CB9F72210", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*", "matchCriteriaId": "F977B432-2709-4D75-AA3E-F440285B7BA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "24D7B67C-6FEC-48F8-9D46-778E4528BC20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "matchCriteriaId": "05006807-D961-446C-B8DC-C87507F1316E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D045BE4B-BC19-4A51-90E6-00C18389C81B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F006960-CDE3-4E74-B4F0-2C4B2CA93959", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0CE1B23-6FE3-41C4-B264-C7A9E8BDBEC1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*", "matchCriteriaId": "794BA13C-3C63-4695-AA45-676F85D904BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20, Snapdragon_High_Med_2016, a potential buffer overflow exists when parsing TFTP options." }, { "lang": "es", "value": "En Snapdragon (Automobile, Mobile y Wear) en versiones MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20 y Snapdragon_High_Med_2016, existe un potencial desbordamiento de b\u00fafer al analizar opciones TFTP." } ], "id": "CVE-2018-11268", "lastModified": "2024-11-21T03:43:01.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-20T13:29:00.933", "references": [ { "source": "product-security@qualcomm.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106845" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106845" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" } ], "sourceIdentifier": "product-security@qualcomm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-129" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A960B86A-C397-4ACB-AEE6-55F316D32949", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "matchCriteriaId": "D79B8959-3D1E-4B48-9181-D75FE90AAF98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A35FECFB-60AE-42A8-BCBB-FEA7D5826D49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9765187-8653-4D66-B230-B2CE862AC5C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EF77DD1-BE11-4132-9889-646196FAE567", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB323C15-2018-4CB8-858E-56F088B03FBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FD1C359-C79B-4CE8-A192-5AA34D0BF05B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", "matchCriteriaId": "716B747E-672C-4B95-9D8E-1262338E67EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9645_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "65E5C59A-ABCF-4F62-8C6D-ECDACDAA83C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9645:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F8F856B-70D7-4A1A-8257-90AAAE62CD6F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD99C6F-2444-4A5E-A517-0C8023DDF23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7AFDBF8-D08A-4C98-B4A4-A4C7049DD05F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*", "matchCriteriaId": "520B217E-C02B-493D-8C11-E155E50357B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE28A59C-7AA6-4B85-84E8-07852B96108E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DEE828B-09A7-4AC1-8134-491A7C87C118", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D6D6965-B5B2-46D2-8718-43B7B22441C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*", "matchCriteriaId": "E75C7497-A7DC-436B-BACD-71F69D99517D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd212_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AC3A8D2-2860-4A34-B9A8-0077263E4563", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd212:-:*:*:*:*:*:*:*", "matchCriteriaId": "B67ABF7B-5719-4C99-87C4-75499E98A281", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47AB5135-6391-45C1-81DE-803E3834F196", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCEF246C-6B39-4DC2-81B0-040DCAAD5177", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd410_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBD160D5-5DE6-4A74-A941-AFC4607C0F67", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd410:-:*:*:*:*:*:*:*", "matchCriteriaId": "C39B97F7-1A96-4773-B46F-88F3DE07DC2D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd412_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A31A926B-2FDD-4642-9B21-AF63DCCC263E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd412:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D2D115F-66D0-4D45-959A-F60AA111356F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd425_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC5ECC0E-0120-47E5-9D00-440DC38F2C0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd425:-:*:*:*:*:*:*:*", "matchCriteriaId": "352E745F-375B-43AE-9B29-8A2D50C695B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd427_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9CDD792-89BC-4A7B-A971-4C04663E62A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd427:-:*:*:*:*:*:*:*", "matchCriteriaId": "64D6ACA2-47C7-4E44-A838-22600B5BC52E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd430_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6652C54-B207-4816-B70D-5DD2C792D1DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd430:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD3B99CC-CC53-42A6-9C42-0C06E734A554", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd435_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C2951AF-E04B-433B-B327-03D8D28B2BDE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd435:-:*:*:*:*:*:*:*", "matchCriteriaId": "084BB475-8F09-408E-AF1C-D0CA4DD8D414", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd450_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF6EA9F3-ED14-4DAC-93D1-2DF63C7C3EAC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd450:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4EF0B75-2431-4E44-B515-11C9BD4BC982", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd615_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "12BB71F6-FABD-423D-AC7D-CA66BCE1A89D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd615:-:*:*:*:*:*:*:*", "matchCriteriaId": "77FB761D-7C87-4A9A-A227-17D5DBE0BDBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd616_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C73516F0-831B-40F0-BAE5-B45660D3507A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd616:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC8F5E3A-2FEF-4713-AC4D-EBAFFD697CE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd415_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "45D289EE-7423-4396-9F32-3D576E72238E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd415:-:*:*:*:*:*:*:*", "matchCriteriaId": "43EA6FCE-2BFD-4588-B793-758BA0308C24", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd617_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F3D690E-908B-49DF-8341-9CFAE6DF5E44", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd617:-:*:*:*:*:*:*:*", "matchCriteriaId": "274F8FC2-F564-4D87-B259-6AB5E035E73E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd625_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C5E72A3-2117-4190-978F-EFB4DDE4EC9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd625:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EEF23-73EB-49AE-B9F1-4702D545D643", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A83A1CF-396D-403F-AA22-0ED817DD384B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd650:-:*:*:*:*:*:*:*", "matchCriteriaId": "21AEAA09-3C1B-4413-8418-63644DB3FABA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd652_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6C536B0-32E9-42D0-B298-B4D77CC94914", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd652:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F81E096-820A-4B27-A539-5D3BA39FA5C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd810_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EA7F1BB-B099-41D3-94A6-196CD4DF2548", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd810:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F00BF76-0D5E-4647-9BB5-0B4B57F64110", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC508C49-0B76-43A8-B2AF-0F8EB989E238", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd820:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9665200-D306-4EEB-9F42-6C5963524179", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd820a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB757118-0F90-4E6E-AD4F-A05A5791B20C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd820a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BCD9420-26A7-4444-9AA4-D7B0AC42FA84", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DA605FD-B801-43BB-B52D-879013F7F57E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*", "matchCriteriaId": "908BFD96-0423-4AFC-B8F3-105B2D5B4C73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2326BD7-28A5-4244-8501-B109913E7AE6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*", "matchCriteriaId": "532D244B-8B5A-4923-B7F1-9DC0A5FC0E9D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DFD2C9A-6C25-4B8F-BE64-DAD3DCCDEADD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DE61FCE-CA87-46E1-981D-B44697E54CB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "84289E6D-DA2A-4D04-9DDA-E8C46DDDD056", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0B56360-7AC3-410A-B7F8-1BE8514B3781", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EA0D645-80F6-48C3-AF0D-99198ADC8778", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*", "matchCriteriaId": "814FF3F3-CD5A-45A3-988C-6457D2CEB48C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A02E12AC-F845-4164-9D95-ACD7167B6DD6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*", "matchCriteriaId": "321F7DE7-E6E9-449F-867B-04A9F53334B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F00D854-0AC7-415F-B19A-642CB9F72210", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*", "matchCriteriaId": "F977B432-2709-4D75-AA3E-F440285B7BA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "24D7B67C-6FEC-48F8-9D46-778E4528BC20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "matchCriteriaId": "05006807-D961-446C-B8DC-C87507F1316E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, Snapdragon_High_Med_2016, on TZ cold boot the CNOC_QDSS RG0 locked by xBL_SEC is cleared by TZ." }, { "lang": "es", "value": "En Snapdragon (Automobile, Mobile y Wear) en versiones MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660 y Snapdragon_High_Med_2016, en TZ se podr\u00eda arrancar CNOC_QDSS RG0 bloqueado por xBL_SEC al ser limpiado por TZ." } ], "id": "CVE-2017-18314", "lastModified": "2024-11-21T03:19:50.143", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-20T13:29:00.667", "references": [ { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" } ], "sourceIdentifier": "product-security@qualcomm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A725088-FC3B-4439-9189-72AA10954721", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:c-v2x_9150:-:*:*:*:*:*:*:*", "matchCriteriaId": "B80D6366-4C0C-4C0D-9A38-769C66D62F0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*", "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*", "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*", "matchCriteriaId": "47E674DE-55AB-44E5-8E00-C804FC9D4DC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A963FDF-6FF4-4F48-834E-2A14D241716D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", "matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "65303C2D-C6BF-47CB-8146-E240CB8BBE42", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6B03022-497A-4F42-BB4D-5624EA7DF1B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*", "matchCriteriaId": "969585DE-93D6-4406-A632-D838ECD4D5AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*", "matchCriteriaId": "29762819-EC90-499C-A8C6-1423DE3FE6B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:qcs8155_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "487E7EA3-CE9C-4DB9-97D9-A74406C8BC9B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:qcs8155:-:*:*:*:*:*:*:*", "matchCriteriaId": "644A4FF4-1494-480B-BDBA-22CC13C4E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:205_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E9FB225-819E-44FD-B6B9-8A49909750B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:205:-:*:*:*:*:*:*:*", "matchCriteriaId": "57A101BE-894F-40F6-A8FD-9E8DF21076DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:215_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3667862-8469-4B33-9B2D-939EA07497E6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:215:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8673678-1EAD-421D-8450-3BE522D75A5F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*", "matchCriteriaId": "910CBFA4-50F7-4C7A-B9B9-B88C8A919827", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", "matchCriteriaId": "F562ED3D-CBE3-4DCC-BFBB-DE0AD2425A9C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*", "matchCriteriaId": "04D40EC4-BF31-4BFD-8D0A-8193F541AF02", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E93FB34B-3674-404D-9687-E092E9A246AB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3FF5A9A-A34A-499C-B6E0-D67B496C5454", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D6D6965-B5B2-46D2-8718-43B7B22441C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*", "matchCriteriaId": "E75C7497-A7DC-436B-BACD-71F69D99517D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd212_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AC3A8D2-2860-4A34-B9A8-0077263E4563", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd212:-:*:*:*:*:*:*:*", "matchCriteriaId": "B67ABF7B-5719-4C99-87C4-75499E98A281", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "985A7570-846E-4ED8-8EF0-E529231CE0B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BB1B4D9-EAE6-4395-8B8A-C97F15A64DFA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5501670-56E2-48B6-ACFC-67F908D5ECCA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:snapdragon_855:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3AB9254-8202-411C-9700-C2739D9C317C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+\\/860_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D3B35BA-D853-40D6-9E25-BF686FC72CC4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+\\/860:-:*:*:*:*:*:*:*", "matchCriteriaId": "37778EA4-A0E2-4E5A-BB6C-0AEAEDB2B4A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:snapdragon_865_5g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "713B1CB7-985F-49F4-A5A7-23DFD0F4EA04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:snapdragon_865_5g:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D7467AE-2EC2-4D9C-9D9C-83BAE7AE48CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F15FC88-6366-4210-A949-75A3890476B2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g:-:*:*:*:*:*:*:*", "matchCriteriaId": "711C5A1C-F67B-4BE2-BFE7-C86E716F85E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6D89373-04BA-4DD4-A0D0-A45AF93FA7AB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:snapdragon_870_5g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE485ADB-9A68-41AE-BBA8-242AC27263DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "158F6ED7-FB30-47BF-BDAE-91BED7A58157", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1:-:*:*:*:*:*:*:*", "matchCriteriaId": "89A06BE0-4F54-4591-836D-4D70D9976BBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_4100\\+_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA1AEB2C-F420-46A6-8804-A35870153BAA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:snapdragon_wear_4100\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "20746D0A-8D06-4483-AE84-2E0232259171", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "50081C21-0E3C-451C-B5D9-BFA6763FC92A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8D443BF-15A5-4984-972B-0BC5BEDC835B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "665811D8-F648-4F32-A375-FAF9C9E928B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2_5g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A537932-6EAD-411B-83FF-48CF050F603A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B8455D6-287D-4934-8E4D-F4127A9C0449", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEB883BF-68B2-4C25-84DC-5DA953BFAA2F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*", "matchCriteriaId": "95762B01-2762-45BD-8388-5DB77EA6139C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D9E96B3-F1BB-46F8-B715-7DF90180F1E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAFD64E7-3F13-4DCA-8C46-6E8FE0C6F798", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*", "matchCriteriaId": "044A14FB-64F6-4200-AC85-8DC91C31BD16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE861CE7-B530-4698-A9BC-43A159647BF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The cam_get_device_priv function does not check the type of handle being returned (device/session/link). This would lead to invalid type usage if a wrong handle is passed to it." }, { "lang": "es", "value": "La funci\u00f3n cam_get_device_priv no comprueba el tipo de manejador devuelto (device/session/link). Esto llevar\u00eda a un uso de tipo inv\u00e1lido si se le pasa un manejador incorrecto." } ], "id": "CVE-2023-28575", "lastModified": "2024-11-21T07:55:33.903", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "product-security@qualcomm.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-08T10:15:14.537", "references": [ { "source": "product-security@qualcomm.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin" } ], "sourceIdentifier": "product-security@qualcomm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-823" } ], "source": "product-security@qualcomm.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2914BF98-E69C-4C8D-8B10-759642ADD7B4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:ipq8074:-:*:*:*:*:*:*:*", "matchCriteriaId": "2118C404-402F-463C-8160-3CC3B703DF30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A960B86A-C397-4ACB-AEE6-55F316D32949", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "matchCriteriaId": "D79B8959-3D1E-4B48-9181-D75FE90AAF98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A35FECFB-60AE-42A8-BCBB-FEA7D5826D49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9765187-8653-4D66-B230-B2CE862AC5C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FD1C359-C79B-4CE8-A192-5AA34D0BF05B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", "matchCriteriaId": "716B747E-672C-4B95-9D8E-1262338E67EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD99C6F-2444-4A5E-A517-0C8023DDF23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D6D6965-B5B2-46D2-8718-43B7B22441C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*", "matchCriteriaId": "E75C7497-A7DC-436B-BACD-71F69D99517D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd212_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AC3A8D2-2860-4A34-B9A8-0077263E4563", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd212:-:*:*:*:*:*:*:*", "matchCriteriaId": "B67ABF7B-5719-4C99-87C4-75499E98A281", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47AB5135-6391-45C1-81DE-803E3834F196", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCEF246C-6B39-4DC2-81B0-040DCAAD5177", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd425_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC5ECC0E-0120-47E5-9D00-440DC38F2C0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd425:-:*:*:*:*:*:*:*", "matchCriteriaId": "352E745F-375B-43AE-9B29-8A2D50C695B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd427_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9CDD792-89BC-4A7B-A971-4C04663E62A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd427:-:*:*:*:*:*:*:*", "matchCriteriaId": "64D6ACA2-47C7-4E44-A838-22600B5BC52E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd430_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6652C54-B207-4816-B70D-5DD2C792D1DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd430:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD3B99CC-CC53-42A6-9C42-0C06E734A554", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd435_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C2951AF-E04B-433B-B327-03D8D28B2BDE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd435:-:*:*:*:*:*:*:*", "matchCriteriaId": "084BB475-8F09-408E-AF1C-D0CA4DD8D414", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd450_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF6EA9F3-ED14-4DAC-93D1-2DF63C7C3EAC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd450:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4EF0B75-2431-4E44-B515-11C9BD4BC982", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd625_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C5E72A3-2117-4190-978F-EFB4DDE4EC9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd625:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EEF23-73EB-49AE-B9F1-4702D545D643", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd820a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB757118-0F90-4E6E-AD4F-A05A5791B20C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd820a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BCD9420-26A7-4444-9AA4-D7B0AC42FA84", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DA605FD-B801-43BB-B52D-879013F7F57E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*", "matchCriteriaId": "908BFD96-0423-4AFC-B8F3-105B2D5B4C73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd845_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB222869-9CDB-43B1-8947-954C8C8520B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd845:-:*:*:*:*:*:*:*", "matchCriteriaId": "306DAB18-F737-47DE-A47D-C39F1B25D515", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd850_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1CA3237-5F9A-4490-A66B-853BE9310028", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd850:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8F3601C-A801-4EBD-BDCC-2B84898DFBEA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2326BD7-28A5-4244-8501-B109913E7AE6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*", "matchCriteriaId": "532D244B-8B5A-4923-B7F1-9DC0A5FC0E9D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DFD2C9A-6C25-4B8F-BE64-DAD3DCCDEADD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DE61FCE-CA87-46E1-981D-B44697E54CB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "84289E6D-DA2A-4D04-9DDA-E8C46DDDD056", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0B56360-7AC3-410A-B7F8-1BE8514B3781", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EA0D645-80F6-48C3-AF0D-99198ADC8778", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*", "matchCriteriaId": "814FF3F3-CD5A-45A3-988C-6457D2CEB48C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A02E12AC-F845-4164-9D95-ACD7167B6DD6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*", "matchCriteriaId": "321F7DE7-E6E9-449F-867B-04A9F53334B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F00D854-0AC7-415F-B19A-642CB9F72210", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*", "matchCriteriaId": "F977B432-2709-4D75-AA3E-F440285B7BA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "24D7B67C-6FEC-48F8-9D46-778E4528BC20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "matchCriteriaId": "05006807-D961-446C-B8DC-C87507F1316E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D045BE4B-BC19-4A51-90E6-00C18389C81B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F006960-CDE3-4E74-B4F0-2C4B2CA93959", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Snapdragon (Automobile, Mobile, Wear) in version IPQ8074, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016, MAC address randomization performed during probe requests is not done properly due to a flawed RNG which produced repeating output much earlier than expected." }, { "lang": "es", "value": "En Snapdragon (Automobile, Mobile y Wear) en versiones IPQ8074, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710 y Snapdragon_High_Med_2016, la aleatorizaci\u00f3n de direcciones MAC realizada durante las peticiones probe no se realiz\u00f3 correctamente debido al uso de un RGN con errores, lo cual produc\u00eda salidas repetidas antes de lo esperado." } ], "id": "CVE-2018-5837", "lastModified": "2024-11-21T04:09:30.517", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-20T13:29:02.167", "references": [ { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://source.android.com/security/bulletin/2018-07-01#qualcomm-closed-source-components" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://source.android.com/security/bulletin/2018-07-01#qualcomm-closed-source-components" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" } ], "sourceIdentifier": "product-security@qualcomm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-338" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
product-security@qualcomm.com | http://www.securitytracker.com/id/1041432 | Third Party Advisory, VDB Entry | |
product-security@qualcomm.com | https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components | Third Party Advisory | |
product-security@qualcomm.com | https://www.qualcomm.com/company/product-security/bulletins | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041432 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.qualcomm.com/company/product-security/bulletins | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
qualcomm | mdm9206_firmware | - | |
qualcomm | mdm9206 | - | |
qualcomm | mdm9607_firmware | - | |
qualcomm | mdm9607 | - | |
qualcomm | mdm9650_firmware | - | |
qualcomm | mdm9650 | - | |
qualcomm | sd210_firmware | - | |
qualcomm | sd210 | - | |
qualcomm | sd212_firmware | - | |
qualcomm | sd212 | - | |
qualcomm | sd205_firmware | - | |
qualcomm | sd205 | - | |
qualcomm | sd425_firmware | - | |
qualcomm | sd425 | - | |
qualcomm | sd430_firmware | - | |
qualcomm | sd430 | - | |
qualcomm | sd450_firmware | - | |
qualcomm | sd450 | - | |
qualcomm | sd625_firmware | - | |
qualcomm | sd625 | - | |
qualcomm | sd650_firmware | - | |
qualcomm | sd650 | - | |
qualcomm | sd652_firmware | - | |
qualcomm | sd652 | - | |
qualcomm | sd835_firmware | - | |
qualcomm | sd835 | - | |
qualcomm | sda660_firmware | - | |
qualcomm | sda660 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A960B86A-C397-4ACB-AEE6-55F316D32949", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "matchCriteriaId": "D79B8959-3D1E-4B48-9181-D75FE90AAF98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A35FECFB-60AE-42A8-BCBB-FEA7D5826D49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9765187-8653-4D66-B230-B2CE862AC5C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "35B7E25E-FA92-4C36-883C-CFF36F4B3507", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECD99C6F-2444-4A5E-A517-0C8023DDF23D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D6D6965-B5B2-46D2-8718-43B7B22441C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*", "matchCriteriaId": "E75C7497-A7DC-436B-BACD-71F69D99517D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd212_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AC3A8D2-2860-4A34-B9A8-0077263E4563", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd212:-:*:*:*:*:*:*:*", "matchCriteriaId": "B67ABF7B-5719-4C99-87C4-75499E98A281", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47AB5135-6391-45C1-81DE-803E3834F196", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCEF246C-6B39-4DC2-81B0-040DCAAD5177", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd425_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC5ECC0E-0120-47E5-9D00-440DC38F2C0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd425:-:*:*:*:*:*:*:*", "matchCriteriaId": "352E745F-375B-43AE-9B29-8A2D50C695B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd430_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6652C54-B207-4816-B70D-5DD2C792D1DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd430:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD3B99CC-CC53-42A6-9C42-0C06E734A554", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd450_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF6EA9F3-ED14-4DAC-93D1-2DF63C7C3EAC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd450:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4EF0B75-2431-4E44-B515-11C9BD4BC982", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd625_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C5E72A3-2117-4190-978F-EFB4DDE4EC9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd625:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD2EEF23-73EB-49AE-B9F1-4702D545D643", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd650_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A83A1CF-396D-403F-AA22-0ED817DD384B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd650:-:*:*:*:*:*:*:*", "matchCriteriaId": "21AEAA09-3C1B-4413-8418-63644DB3FABA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd652_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6C536B0-32E9-42D0-B298-B4D77CC94914", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd652:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F81E096-820A-4B27-A539-5D3BA39FA5C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DA605FD-B801-43BB-B52D-879013F7F57E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*", "matchCriteriaId": "908BFD96-0423-4AFC-B8F3-105B2D5B4C73", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2326BD7-28A5-4244-8501-B109913E7AE6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*", "matchCriteriaId": "532D244B-8B5A-4923-B7F1-9DC0A5FC0E9D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Non-secure SW can cause SDCC to generate secure bus accesses, which may expose RPM access in Snapdragon Mobile, Snapdragon Wear in version MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 835, SDA660." }, { "lang": "es", "value": "Un software inseguro puede provocar que SDCC genere accesos seguros al bus, lo que podr\u00eda exponer el acceso RPM en Snapdragon Mobile y Snapdragon Wear en versiones MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 835 y SDA660." } ], "id": "CVE-2017-18282", "lastModified": "2024-11-21T03:19:45.800", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-10-23T13:29:00.837", "references": [ { "source": "product-security@qualcomm.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041432" }, { "source": "product-security@qualcomm.com", "tags": [ "Third Party Advisory" ], "url": "https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components" }, { "source": "product-security@qualcomm.com", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041432" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" } ], "sourceIdentifier": "product-security@qualcomm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2018-11285 (GCVE-0-2018-11285)
Vulnerability from cvelistv5
- Buffer over-read in Video
▼ | URL | Tags |
---|---|---|
https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components | x_refsource_CONFIRM | |
https://www.qualcomm.com/company/product-security/bulletins | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
Qualcomm, Inc. | Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear |
Version: MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20, Snapdragon_High_Med_2016 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:01:52.839Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear", "vendor": "Qualcomm, Inc.", "versions": [ { "status": "affected", "version": "MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20, Snapdragon_High_Med_2016" } ] } ], "datePublic": "2018-09-04T00:00:00", "descriptions": [ { "lang": "en", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20, Snapdragon_High_Med_2016, while parsing FLAC file with corrupted picture block, a buffer over-read can occur." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer over-read in Video", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-09-20T12:57:01", "orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "shortName": "qualcomm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@qualcomm.com", "ID": "CVE-2018-11285", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear", "version": { "version_data": [ { "version_value": "MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20, Snapdragon_High_Med_2016" } ] } } ] }, "vendor_name": "Qualcomm, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20, Snapdragon_High_Med_2016, while parsing FLAC file with corrupted picture block, a buffer over-read can occur." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer over-read in Video" } ] } ] }, "references": { "reference_data": [ { "name": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components", "refsource": "CONFIRM", "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "name": "https://www.qualcomm.com/company/product-security/bulletins", "refsource": "CONFIRM", "url": "https://www.qualcomm.com/company/product-security/bulletins" } ] } } } }, "cveMetadata": { "assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "assignerShortName": "qualcomm", "cveId": "CVE-2018-11285", "datePublished": "2018-09-20T13:00:00", "dateReserved": "2018-05-18T00:00:00", "dateUpdated": "2024-08-05T08:01:52.839Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-28575 (GCVE-0-2023-28575)
Vulnerability from cvelistv5
- CWE-823 - Use of Out-of-range Pointer Offset
Vendor | Product | Version | ||
---|---|---|---|---|
Qualcomm, Inc. | Snapdragon |
Version: AQT1000 Version: C-V2X 9150 Version: FastConnect 6200 Version: FastConnect 6800 Version: FastConnect 6900 Version: FastConnect 7800 Version: QAM8295P Version: QCA6391 Version: QCA6420 Version: QCA6426 Version: QCA6430 Version: QCA6436 Version: QCA6574AU Version: QCA6696 Version: QCA8337 Version: QCN9074 Version: QCS410 Version: QCS610 Version: QCS8155 Version: Qualcomm 205 Mobile Platform Version: Qualcomm 215 Mobile Platform Version: SA6145P Version: SA6150P Version: SA6155P Version: SA8145P Version: SA8150P Version: SA8155P Version: SA8195P Version: SA8295P Version: SD855 Version: SD865 5G Version: SDX55 Version: Snapdragon 210 Processor Version: Snapdragon 212 Mobile Platform Version: Snapdragon 8 Gen 1 Mobile Platform Version: Snapdragon 855 Mobile Platform Version: Snapdragon 855+/860 Mobile Platform (SM8150-AC) Version: Snapdragon 865 5G Mobile Platform Version: Snapdragon 865+ 5G Mobile Platform (SM8250-AB) Version: Snapdragon 870 5G Mobile Platform (SM8250-AC) Version: Snapdragon W5+ Gen 1 Wearable Platform Version: Snapdragon Wear 4100+ Platform Version: Snapdragon X55 5G Modem-RF System Version: Snapdragon XR2 5G Platform Version: SW5100 Version: SW5100P Version: SXR2130 Version: WCD9341 Version: WCD9370 Version: WCD9380 Version: WCN3610 Version: WCN3660B Version: WCN3680B Version: WCN3950 Version: WCN3980 Version: WCN3988 Version: WSA8810 Version: WSA8815 Version: WSA8830 Version: WSA8835 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T13:43:22.550Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Snapdragon Auto", "Snapdragon Compute", "Snapdragon Consumer IOT", "Snapdragon Industrial IOT", "Snapdragon Mobile", "Snapdragon Wearables" ], "product": "Snapdragon", "vendor": "Qualcomm, Inc.", "versions": [ { "status": "affected", "version": "AQT1000" }, { "status": "affected", "version": "C-V2X 9150" }, { "status": "affected", "version": "FastConnect 6200" }, { "status": "affected", "version": "FastConnect 6800" }, { "status": "affected", "version": "FastConnect 6900" }, { "status": "affected", "version": "FastConnect 7800" }, { "status": "affected", "version": "QAM8295P" }, { "status": "affected", "version": "QCA6391" }, { "status": "affected", "version": "QCA6420" }, { "status": "affected", "version": "QCA6426" }, { "status": "affected", "version": "QCA6430" }, { "status": "affected", "version": "QCA6436" }, { "status": "affected", "version": "QCA6574AU" }, { "status": "affected", "version": "QCA6696" }, { "status": "affected", "version": "QCA8337" }, { "status": "affected", "version": "QCN9074" }, { "status": "affected", "version": "QCS410" }, { "status": "affected", "version": "QCS610" }, { "status": "affected", "version": "QCS8155" }, { "status": "affected", "version": "Qualcomm 205 Mobile Platform" }, { "status": "affected", "version": "Qualcomm 215 Mobile Platform" }, { "status": "affected", "version": "SA6145P" }, { "status": "affected", "version": "SA6150P" }, { "status": "affected", "version": "SA6155P" }, { "status": "affected", "version": "SA8145P" }, { "status": "affected", "version": "SA8150P" }, { "status": "affected", "version": "SA8155P" }, { "status": "affected", "version": "SA8195P" }, { "status": "affected", "version": "SA8295P" }, { "status": "affected", "version": "SD855" }, { "status": "affected", "version": "SD865 5G" }, { "status": "affected", "version": "SDX55" }, { "status": "affected", "version": "Snapdragon 210 Processor" }, { "status": "affected", "version": "Snapdragon 212 Mobile Platform" }, { "status": "affected", "version": "Snapdragon 8 Gen 1 Mobile Platform" }, { "status": "affected", "version": "Snapdragon 855 Mobile Platform" }, { "status": "affected", "version": "Snapdragon 855+/860 Mobile Platform (SM8150-AC)" }, { "status": "affected", "version": "Snapdragon 865 5G Mobile Platform" }, { "status": "affected", "version": "Snapdragon 865+ 5G Mobile Platform (SM8250-AB)" }, { "status": "affected", "version": "Snapdragon 870 5G Mobile Platform (SM8250-AC)" }, { "status": "affected", "version": "Snapdragon W5+ Gen 1 Wearable Platform" }, { "status": "affected", "version": "Snapdragon Wear 4100+ Platform" }, { "status": "affected", "version": "Snapdragon X55 5G Modem-RF System" }, { "status": "affected", "version": "Snapdragon XR2 5G Platform" }, { "status": "affected", "version": "SW5100" }, { "status": "affected", "version": "SW5100P" }, { "status": "affected", "version": "SXR2130" }, { "status": "affected", "version": "WCD9341" }, { "status": "affected", "version": "WCD9370" }, { "status": "affected", "version": "WCD9380" }, { "status": "affected", "version": "WCN3610" }, { "status": "affected", "version": "WCN3660B" }, { "status": "affected", "version": "WCN3680B" }, { "status": "affected", "version": "WCN3950" }, { "status": "affected", "version": "WCN3980" }, { "status": "affected", "version": "WCN3988" }, { "status": "affected", "version": "WSA8810" }, { "status": "affected", "version": "WSA8815" }, { "status": "affected", "version": "WSA8830" }, { "status": "affected", "version": "WSA8835" } ] } ], "descriptions": [ { "lang": "en", "value": "The cam_get_device_priv function does not check the type of handle being returned (device/session/link). This would lead to invalid type usage if a wrong handle is passed to it." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-823", "description": "CWE-823 Use of Out-of-range Pointer Offset", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-12T16:24:12.547Z", "orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "shortName": "qualcomm" }, "references": [ { "url": "https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin" } ], "title": "Multiple Type Confusion Vulnerability" } }, "cveMetadata": { "assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "assignerShortName": "qualcomm", "cveId": "CVE-2023-28575", "datePublished": "2023-08-08T09:15:04.824Z", "dateReserved": "2023-03-17T11:41:45.850Z", "dateUpdated": "2024-08-02T13:43:22.550Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-11269 (GCVE-0-2018-11269)
Vulnerability from cvelistv5
- Improper Validation of Array Index in Storage
▼ | URL | Tags |
---|---|---|
https://www.qualcomm.com/company/product-security/bulletins | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/105838 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | ||
---|---|---|---|---|
Qualcomm, Inc. | SSnapdragon Automobile, Snapdragon Mobile, Snapdragon Wear |
Version: MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20, Snapdragon_High_Med_2016 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:01:52.896Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "name": "105838", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105838" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SSnapdragon Automobile, Snapdragon Mobile, Snapdragon Wear", "vendor": "Qualcomm, Inc.", "versions": [ { "status": "affected", "version": "MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20, Snapdragon_High_Med_2016" } ] } ], "datePublic": "2018-09-04T00:00:00", "descriptions": [ { "lang": "en", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20, Snapdragon_High_Med_2016, a potential buffer overflow exists when parsing TFTP options." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Validation of Array Index in Storage", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-07T10:57:01", "orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "shortName": "qualcomm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "name": "105838", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105838" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@qualcomm.com", "ID": "CVE-2018-11269", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SSnapdragon Automobile, Snapdragon Mobile, Snapdragon Wear", "version": { "version_data": [ { "version_value": "MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20, Snapdragon_High_Med_2016" } ] } } ] }, "vendor_name": "Qualcomm, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20, Snapdragon_High_Med_2016, a potential buffer overflow exists when parsing TFTP options." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Validation of Array Index in Storage" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.qualcomm.com/company/product-security/bulletins", "refsource": "CONFIRM", "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "name": "105838", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105838" } ] } } } }, "cveMetadata": { "assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "assignerShortName": "qualcomm", "cveId": "CVE-2018-11269", "datePublished": "2018-09-20T13:00:00", "dateReserved": "2018-05-18T00:00:00", "dateUpdated": "2024-08-05T08:01:52.896Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-18280 (GCVE-0-2017-18280)
Vulnerability from cvelistv5
- Access to the SPI/I2C bus is non-exclusive
▼ | URL | Tags |
---|---|---|
https://www.qualcomm.com/company/product-security/bulletins | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1041432 | vdb-entry, x_refsource_SECTRACK | |
https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
Qualcomm, Inc. | Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear |
Version: MDM9607, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SDM429, SDM439, SDM632, Snapdragon_High_Med_2016 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:13:49.271Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "name": "1041432", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041432" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear", "vendor": "Qualcomm, Inc.", "versions": [ { "status": "affected", "version": "MDM9607, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SDM429, SDM439, SDM632, Snapdragon_High_Med_2016" } ] } ], "datePublic": "2018-08-06T00:00:00", "descriptions": [ { "lang": "en", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9607, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SDM429, SDM439, SDM632, Snapdragon_High_Med_2016, when a Trusted Application has opened the SPI/I2C interface to a particular device, it is possible for another Trusted Application to read the data on this open interface by calling the SPI/I2C read function." } ], "problemTypes": [ { "descriptions": [ { "description": "Access to the SPI/I2C bus is non-exclusive", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-09-21T09:57:01", "orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "shortName": "qualcomm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "name": "1041432", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041432" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@qualcomm.com", "ID": "CVE-2017-18280", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear", "version": { "version_data": [ { "version_value": "MDM9607, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SDM429, SDM439, SDM632, Snapdragon_High_Med_2016" } ] } } ] }, "vendor_name": "Qualcomm, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9607, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SDM429, SDM439, SDM632, Snapdragon_High_Med_2016, when a Trusted Application has opened the SPI/I2C interface to a particular device, it is possible for another Trusted Application to read the data on this open interface by calling the SPI/I2C read function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Access to the SPI/I2C bus is non-exclusive" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.qualcomm.com/company/product-security/bulletins", "refsource": "CONFIRM", "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "name": "1041432", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041432" }, { "name": "https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components", "refsource": "CONFIRM", "url": "https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components" } ] } } } }, "cveMetadata": { "assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "assignerShortName": "qualcomm", "cveId": "CVE-2017-18280", "datePublished": "2018-09-20T13:00:00", "dateReserved": "2018-05-18T00:00:00", "dateUpdated": "2024-08-05T21:13:49.271Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-11287 (GCVE-0-2018-11287)
Vulnerability from cvelistv5
- Always-Incorrect Control Flow Implementation in Video
▼ | URL | Tags |
---|---|---|
https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components | x_refsource_CONFIRM | |
https://www.qualcomm.com/company/product-security/bulletins | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
Qualcomm, Inc. | Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear |
Version: MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:01:52.972Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear", "vendor": "Qualcomm, Inc.", "versions": [ { "status": "affected", "version": "MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016" } ] } ], "datePublic": "2018-09-04T00:00:00", "descriptions": [ { "lang": "en", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016, incorrect control flow implementation in Video while checking buffer sufficiency." } ], "problemTypes": [ { "descriptions": [ { "description": "Always-Incorrect Control Flow Implementation in Video ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-09-20T12:57:01", "orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "shortName": "qualcomm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@qualcomm.com", "ID": "CVE-2018-11287", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear", "version": { "version_data": [ { "version_value": "MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016" } ] } } ] }, "vendor_name": "Qualcomm, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016, incorrect control flow implementation in Video while checking buffer sufficiency." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Always-Incorrect Control Flow Implementation in Video " } ] } ] }, "references": { "reference_data": [ { "name": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components", "refsource": "CONFIRM", "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "name": "https://www.qualcomm.com/company/product-security/bulletins", "refsource": "CONFIRM", "url": "https://www.qualcomm.com/company/product-security/bulletins" } ] } } } }, "cveMetadata": { "assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "assignerShortName": "qualcomm", "cveId": "CVE-2018-11287", "datePublished": "2018-09-20T13:00:00", "dateReserved": "2018-05-18T00:00:00", "dateUpdated": "2024-08-05T08:01:52.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-11292 (GCVE-0-2018-11292)
Vulnerability from cvelistv5
- Buffer Overflow in WLAN
▼ | URL | Tags |
---|---|---|
https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components | x_refsource_CONFIRM | |
https://www.qualcomm.com/company/product-security/bulletins | x_refsource_CONFIRM | |
http://support.blackberry.com/kb/articleDetail?language=en_US&articleNumber=000051618 | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
Qualcomm, Inc. | Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear |
Version: MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCA6574AU, QCA6584, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820A, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, Snapdragon_High_Med_2016 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:01:52.813Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.blackberry.com/kb/articleDetail?language=en_US\u0026articleNumber=000051618" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear", "vendor": "Qualcomm, Inc.", "versions": [ { "status": "affected", "version": "MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCA6574AU, QCA6584, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820A, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, Snapdragon_High_Med_2016" } ] } ], "datePublic": "2018-09-04T00:00:00", "descriptions": [ { "lang": "en", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCA6574AU, QCA6584, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820A, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, Snapdragon_High_Med_2016, lack of input validation in WLANWMI command handlers can lead to integer \u0026 heap overflows." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer Overflow in WLAN", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-09-20T12:57:01", "orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "shortName": "qualcomm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.blackberry.com/kb/articleDetail?language=en_US\u0026articleNumber=000051618" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@qualcomm.com", "ID": "CVE-2018-11292", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear", "version": { "version_data": [ { "version_value": "MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCA6574AU, QCA6584, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820A, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, Snapdragon_High_Med_2016" } ] } } ] }, "vendor_name": "Qualcomm, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCA6574AU, QCA6584, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820A, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, Snapdragon_High_Med_2016, lack of input validation in WLANWMI command handlers can lead to integer \u0026 heap overflows." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer Overflow in WLAN" } ] } ] }, "references": { "reference_data": [ { "name": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components", "refsource": "CONFIRM", "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "name": "https://www.qualcomm.com/company/product-security/bulletins", "refsource": "CONFIRM", "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "name": "http://support.blackberry.com/kb/articleDetail?language=en_US\u0026articleNumber=000051618", "refsource": "CONFIRM", "url": "http://support.blackberry.com/kb/articleDetail?language=en_US\u0026articleNumber=000051618" } ] } } } }, "cveMetadata": { "assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "assignerShortName": "qualcomm", "cveId": "CVE-2018-11292", "datePublished": "2018-09-20T13:00:00", "dateReserved": "2018-05-18T00:00:00", "dateUpdated": "2024-08-05T08:01:52.813Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-18282 (GCVE-0-2017-18282)
Vulnerability from cvelistv5
- NImproper Access Control in Access Control module
▼ | URL | Tags |
---|---|---|
https://www.qualcomm.com/company/product-security/bulletins | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1041432 | vdb-entry, x_refsource_SECTRACK | |
https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
Qualcomm, Inc. | Snapdragon Mobile, Snapdragon Wear |
Version: MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 835, SDA660 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:20:49.699Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "name": "1041432", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041432" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Snapdragon Mobile, Snapdragon Wear", "vendor": "Qualcomm, Inc.", "versions": [ { "status": "affected", "version": "MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 835, SDA660" } ] } ], "datePublic": "2018-08-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Non-secure SW can cause SDCC to generate secure bus accesses, which may expose RPM access in Snapdragon Mobile, Snapdragon Wear in version MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 835, SDA660." } ], "problemTypes": [ { "descriptions": [ { "description": "NImproper Access Control in Access Control module", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-24T09:57:01", "orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "shortName": "qualcomm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "name": "1041432", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041432" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@qualcomm.com", "ID": "CVE-2017-18282", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Snapdragon Mobile, Snapdragon Wear", "version": { "version_data": [ { "version_value": "MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 835, SDA660" } ] } } ] }, "vendor_name": "Qualcomm, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Non-secure SW can cause SDCC to generate secure bus accesses, which may expose RPM access in Snapdragon Mobile, Snapdragon Wear in version MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 835, SDA660." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "NImproper Access Control in Access Control module" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.qualcomm.com/company/product-security/bulletins", "refsource": "CONFIRM", "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "name": "1041432", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041432" }, { "name": "https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components", "refsource": "CONFIRM", "url": "https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components" } ] } } } }, "cveMetadata": { "assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "assignerShortName": "qualcomm", "cveId": "CVE-2017-18282", "datePublished": "2018-10-23T13:00:00", "dateReserved": "2018-05-18T00:00:00", "dateUpdated": "2024-08-05T21:20:49.699Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-11268 (GCVE-0-2018-11268)
Vulnerability from cvelistv5
- Improper Validation of Array Index in Storage
▼ | URL | Tags |
---|---|---|
https://www.qualcomm.com/company/product-security/bulletins | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/106845 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | ||
---|---|---|---|---|
Qualcomm, Inc. | Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear |
Version: FSM9055, FSM9955, MDM9607, MDM9640, MDM9650, MSM8909W, SD 425, SD 427, SD 430, SD 435, SD 450, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SDM630, SDM636, SDM660, SDX20, Snapdragon_High_Med_2016 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:01:52.864Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "name": "106845", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106845" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear", "vendor": "Qualcomm, Inc.", "versions": [ { "status": "affected", "version": "FSM9055, FSM9955, MDM9607, MDM9640, MDM9650, MSM8909W, SD 425, SD 427, SD 430, SD 435, SD 450, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SDM630, SDM636, SDM660, SDX20, Snapdragon_High_Med_2016" } ] } ], "datePublic": "2018-09-04T00:00:00", "descriptions": [ { "lang": "en", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20, Snapdragon_High_Med_2016, a potential buffer overflow exists when parsing TFTP options." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Validation of Array Index in Storage", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-02-06T10:57:02", "orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "shortName": "qualcomm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "name": "106845", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106845" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@qualcomm.com", "ID": "CVE-2018-11268", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear", "version": { "version_data": [ { "version_value": "FSM9055, FSM9955, MDM9607, MDM9640, MDM9650, MSM8909W, SD 425, SD 427, SD 430, SD 435, SD 450, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SDM630, SDM636, SDM660, SDX20, Snapdragon_High_Med_2016" } ] } } ] }, "vendor_name": "Qualcomm, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20, Snapdragon_High_Med_2016, a potential buffer overflow exists when parsing TFTP options." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Validation of Array Index in Storage" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.qualcomm.com/company/product-security/bulletins", "refsource": "CONFIRM", "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "name": "106845", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106845" } ] } } } }, "cveMetadata": { "assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "assignerShortName": "qualcomm", "cveId": "CVE-2018-11268", "datePublished": "2018-09-20T13:00:00", "dateReserved": "2018-05-18T00:00:00", "dateUpdated": "2024-08-05T08:01:52.864Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-11267 (GCVE-0-2018-11267)
Vulnerability from cvelistv5
- Improper Validation of Array Index in Core
▼ | URL | Tags |
---|---|---|
https://www.qualcomm.com/company/product-security/bulletins | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/106128 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | ||
---|---|---|---|---|
Qualcomm, Inc. | Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear |
Version: MDM9206, MDM9607, MDM9615, MDM9640, MDM9650, MDM9655, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 600, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDX20, Snapdragon_High_Med_2016 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:01:52.834Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "name": "106128", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106128" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear", "vendor": "Qualcomm, Inc.", "versions": [ { "status": "affected", "version": "MDM9206, MDM9607, MDM9615, MDM9640, MDM9650, MDM9655, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 600, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDX20, Snapdragon_High_Med_2016" } ] } ], "datePublic": "2018-09-04T00:00:00", "descriptions": [ { "lang": "en", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9615, MDM9640, MDM9650, MDM9655, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 600, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDX20, Snapdragon_High_Med_2016, when sending an malformed XML data to deviceprogrammer/firehose it may do an out of bounds buffer write allowing a region of memory to be filled with 0x20." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Validation of Array Index in Core", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-07T10:57:01", "orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "shortName": "qualcomm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "name": "106128", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106128" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@qualcomm.com", "ID": "CVE-2018-11267", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear", "version": { "version_data": [ { "version_value": "MDM9206, MDM9607, MDM9615, MDM9640, MDM9650, MDM9655, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 600, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDX20, Snapdragon_High_Med_2016" } ] } } ] }, "vendor_name": "Qualcomm, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9615, MDM9640, MDM9650, MDM9655, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 600, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDX20, Snapdragon_High_Med_2016, when sending an malformed XML data to deviceprogrammer/firehose it may do an out of bounds buffer write allowing a region of memory to be filled with 0x20." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Validation of Array Index in Core" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.qualcomm.com/company/product-security/bulletins", "refsource": "CONFIRM", "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "name": "106128", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106128" } ] } } } }, "cveMetadata": { "assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "assignerShortName": "qualcomm", "cveId": "CVE-2018-11267", "datePublished": "2018-09-20T13:00:00", "dateReserved": "2018-05-18T00:00:00", "dateUpdated": "2024-08-05T08:01:52.834Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-18314 (GCVE-0-2017-18314)
Vulnerability from cvelistv5
- Improper Access Control in Core
▼ | URL | Tags |
---|---|---|
https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components | x_refsource_CONFIRM | |
https://www.qualcomm.com/company/product-security/bulletins | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
Qualcomm, Inc. | Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear |
Version: FSM9055, FSM9955, MDM9607, MDM9640, MDM9650, MSM8909W, SD 425, SD 427, SD 430, SD 435, SD 450, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SDM630, SDM636, SDM660, SDX20, Snapdragon_High_Med_2016 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:20:50.354Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear", "vendor": "Qualcomm, Inc.", "versions": [ { "status": "affected", "version": "FSM9055, FSM9955, MDM9607, MDM9640, MDM9650, MSM8909W, SD 425, SD 427, SD 430, SD 435, SD 450, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SDM630, SDM636, SDM660, SDX20, Snapdragon_High_Med_2016" } ] } ], "datePublic": "2018-09-04T00:00:00", "descriptions": [ { "lang": "en", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, Snapdragon_High_Med_2016, on TZ cold boot the CNOC_QDSS RG0 locked by xBL_SEC is cleared by TZ." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control in Core", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-09-20T12:57:01", "orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "shortName": "qualcomm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@qualcomm.com", "ID": "CVE-2017-18314", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear", "version": { "version_data": [ { "version_value": "FSM9055, FSM9955, MDM9607, MDM9640, MDM9650, MSM8909W, SD 425, SD 427, SD 430, SD 435, SD 450, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SDM630, SDM636, SDM660, SDX20, Snapdragon_High_Med_2016" } ] } } ] }, "vendor_name": "Qualcomm, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, Snapdragon_High_Med_2016, on TZ cold boot the CNOC_QDSS RG0 locked by xBL_SEC is cleared by TZ." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control in Core" } ] } ] }, "references": { "reference_data": [ { "name": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components", "refsource": "CONFIRM", "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "name": "https://www.qualcomm.com/company/product-security/bulletins", "refsource": "CONFIRM", "url": "https://www.qualcomm.com/company/product-security/bulletins" } ] } } } }, "cveMetadata": { "assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "assignerShortName": "qualcomm", "cveId": "CVE-2017-18314", "datePublished": "2018-09-20T13:00:00", "dateReserved": "2018-06-15T00:00:00", "dateUpdated": "2024-08-05T21:20:50.354Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-11277 (GCVE-0-2018-11277)
Vulnerability from cvelistv5
- Permission Issues in Telephony
▼ | URL | Tags |
---|---|---|
https://www.qualcomm.com/company/product-security/bulletins | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
Qualcomm, Inc. | Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear |
Version: MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SDA660 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:01:52.986Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear", "vendor": "Qualcomm, Inc.", "versions": [ { "status": "affected", "version": "MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SDA660" } ] } ], "datePublic": "2018-09-04T00:00:00", "descriptions": [ { "lang": "en", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SDA660, the com.qualcomm.embms is a vendor package deployed in the system image which has an inadequate permission level and allows any application installed from Play Store to request this permission at install-time. The system application interfaces with the Radio Interface Layer leading to potential access control issue." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission Issues in Telephony", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-09-20T12:57:01", "orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "shortName": "qualcomm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@qualcomm.com", "ID": "CVE-2018-11277", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear", "version": { "version_data": [ { "version_value": "MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SDA660" } ] } } ] }, "vendor_name": "Qualcomm, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SDA660, the com.qualcomm.embms is a vendor package deployed in the system image which has an inadequate permission level and allows any application installed from Play Store to request this permission at install-time. The system application interfaces with the Radio Interface Layer leading to potential access control issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission Issues in Telephony" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.qualcomm.com/company/product-security/bulletins", "refsource": "CONFIRM", "url": "https://www.qualcomm.com/company/product-security/bulletins" } ] } } } }, "cveMetadata": { "assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "assignerShortName": "qualcomm", "cveId": "CVE-2018-11277", "datePublished": "2018-09-20T13:00:00", "dateReserved": "2018-05-18T00:00:00", "dateUpdated": "2024-08-05T08:01:52.986Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-5871 (GCVE-0-2018-5871)
Vulnerability from cvelistv5
- Cryptographic Issues in WLAN
▼ | URL | Tags |
---|---|---|
https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components | x_refsource_CONFIRM | |
https://www.qualcomm.com/company/product-security/bulletins | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
Qualcomm, Inc. | Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear |
Version: MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:47:55.965Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear", "vendor": "Qualcomm, Inc.", "versions": [ { "status": "affected", "version": "MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016" } ] } ], "datePublic": "2018-09-04T00:00:00", "descriptions": [ { "lang": "en", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016, MAC address randomization performed during probe requests (for privacy reasons) is not done properly due to a flawed RNG which produces repeating output much earlier than expected." } ], "problemTypes": [ { "descriptions": [ { "description": "Cryptographic Issues in WLAN", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-09-20T12:57:01", "orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "shortName": "qualcomm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@qualcomm.com", "ID": "CVE-2018-5871", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear", "version": { "version_data": [ { "version_value": "MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016" } ] } } ] }, "vendor_name": "Qualcomm, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016, MAC address randomization performed during probe requests (for privacy reasons) is not done properly due to a flawed RNG which produces repeating output much earlier than expected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cryptographic Issues in WLAN" } ] } ] }, "references": { "reference_data": [ { "name": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components", "refsource": "CONFIRM", "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "name": "https://www.qualcomm.com/company/product-security/bulletins", "refsource": "CONFIRM", "url": "https://www.qualcomm.com/company/product-security/bulletins" } ] } } } }, "cveMetadata": { "assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "assignerShortName": "qualcomm", "cveId": "CVE-2018-5871", "datePublished": "2018-09-20T13:00:00", "dateReserved": "2018-01-19T00:00:00", "dateUpdated": "2024-08-05T05:47:55.965Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-11290 (GCVE-0-2018-11290)
Vulnerability from cvelistv5
- Cryptographic Issues in WLAN
▼ | URL | Tags |
---|---|---|
https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components | x_refsource_CONFIRM | |
https://www.qualcomm.com/company/product-security/bulletins | x_refsource_CONFIRM | |
http://support.blackberry.com/kb/articleDetail?language=en_US&articleNumber=000051618 | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
Qualcomm, Inc. | Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear |
Version: MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, QCA6584, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 820A, SD 845, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDX20, Snapdragon_High_Med_2016 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:01:52.881Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.blackberry.com/kb/articleDetail?language=en_US\u0026articleNumber=000051618" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear", "vendor": "Qualcomm, Inc.", "versions": [ { "status": "affected", "version": "MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, QCA6584, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 820A, SD 845, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDX20, Snapdragon_High_Med_2016" } ] } ], "datePublic": "2018-09-04T00:00:00", "descriptions": [ { "lang": "en", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, QCA6584, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 820A, SD 845, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDX20, Snapdragon_High_Med_2016, MAC address randomization performed during probe requests is not done properly due to a flawed RNG in use." } ], "problemTypes": [ { "descriptions": [ { "description": "Cryptographic Issues in WLAN", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-09-20T12:57:01", "orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "shortName": "qualcomm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.blackberry.com/kb/articleDetail?language=en_US\u0026articleNumber=000051618" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@qualcomm.com", "ID": "CVE-2018-11290", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear", "version": { "version_data": [ { "version_value": "MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, QCA6584, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 820A, SD 845, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDX20, Snapdragon_High_Med_2016" } ] } } ] }, "vendor_name": "Qualcomm, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, QCA6584, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 820A, SD 845, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDX20, Snapdragon_High_Med_2016, MAC address randomization performed during probe requests is not done properly due to a flawed RNG in use." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cryptographic Issues in WLAN" } ] } ] }, "references": { "reference_data": [ { "name": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components", "refsource": "CONFIRM", "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "name": "https://www.qualcomm.com/company/product-security/bulletins", "refsource": "CONFIRM", "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "name": "http://support.blackberry.com/kb/articleDetail?language=en_US\u0026articleNumber=000051618", "refsource": "CONFIRM", "url": "http://support.blackberry.com/kb/articleDetail?language=en_US\u0026articleNumber=000051618" } ] } } } }, "cveMetadata": { "assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "assignerShortName": "qualcomm", "cveId": "CVE-2018-11290", "datePublished": "2018-09-20T13:00:00", "dateReserved": "2018-05-18T00:00:00", "dateUpdated": "2024-08-05T08:01:52.881Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-11982 (GCVE-0-2018-11982)
Vulnerability from cvelistv5
- Double Free in LTE
▼ | URL | Tags |
---|---|---|
https://www.qualcomm.com/company/product-security/bulletins | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
Qualcomm, Inc. | Snapdragon Mobile, Snapdragon Wear |
Version: MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 835, Snapdragon_High_Med_2016 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:24:03.377Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Snapdragon Mobile, Snapdragon Wear", "vendor": "Qualcomm, Inc.", "versions": [ { "status": "affected", "version": "MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 835, Snapdragon_High_Med_2016" } ] } ], "datePublic": "2018-09-04T00:00:00", "descriptions": [ { "lang": "en", "value": "In Snapdragon (Mobile, Wear) in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 835, Snapdragon_High_Med_2016, a double free of ASN1 heap memory used for EUTRA CAP container occurs during UTRAN to LTE Capability inquiry procedure." } ], "problemTypes": [ { "descriptions": [ { "description": "Double Free in LTE", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-09-20T12:57:01", "orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "shortName": "qualcomm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@qualcomm.com", "ID": "CVE-2018-11982", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Snapdragon Mobile, Snapdragon Wear", "version": { "version_data": [ { "version_value": "MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 835, Snapdragon_High_Med_2016" } ] } } ] }, "vendor_name": "Qualcomm, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Snapdragon (Mobile, Wear) in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 835, Snapdragon_High_Med_2016, a double free of ASN1 heap memory used for EUTRA CAP container occurs during UTRAN to LTE Capability inquiry procedure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Double Free in LTE" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.qualcomm.com/company/product-security/bulletins", "refsource": "CONFIRM", "url": "https://www.qualcomm.com/company/product-security/bulletins" } ] } } } }, "cveMetadata": { "assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "assignerShortName": "qualcomm", "cveId": "CVE-2018-11982", "datePublished": "2018-09-20T13:00:00", "dateReserved": "2018-06-07T00:00:00", "dateUpdated": "2024-08-05T08:24:03.377Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-5837 (GCVE-0-2018-5837)
Vulnerability from cvelistv5
- Cryptographic Issues in WLAN
▼ | URL | Tags |
---|---|---|
https://www.qualcomm.com/company/product-security/bulletins | x_refsource_CONFIRM | |
https://source.android.com/security/bulletin/2018-07-01#qualcomm-closed-source-components | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
Qualcomm, Inc. | Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear |
Version: IPQ8074, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:47:55.801Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://source.android.com/security/bulletin/2018-07-01#qualcomm-closed-source-components" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear", "vendor": "Qualcomm, Inc.", "versions": [ { "status": "affected", "version": "IPQ8074, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016" } ] } ], "datePublic": "2018-07-02T00:00:00", "descriptions": [ { "lang": "en", "value": "In Snapdragon (Automobile, Mobile, Wear) in version IPQ8074, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016, MAC address randomization performed during probe requests is not done properly due to a flawed RNG which produced repeating output much earlier than expected." } ], "problemTypes": [ { "descriptions": [ { "description": "Cryptographic Issues in WLAN", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-09-20T12:57:01", "orgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "shortName": "qualcomm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://source.android.com/security/bulletin/2018-07-01#qualcomm-closed-source-components" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@qualcomm.com", "ID": "CVE-2018-5837", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear", "version": { "version_data": [ { "version_value": "IPQ8074, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016" } ] } } ] }, "vendor_name": "Qualcomm, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Snapdragon (Automobile, Mobile, Wear) in version IPQ8074, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016, MAC address randomization performed during probe requests is not done properly due to a flawed RNG which produced repeating output much earlier than expected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cryptographic Issues in WLAN" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.qualcomm.com/company/product-security/bulletins", "refsource": "CONFIRM", "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "name": "https://source.android.com/security/bulletin/2018-07-01#qualcomm-closed-source-components", "refsource": "CONFIRM", "url": "https://source.android.com/security/bulletin/2018-07-01#qualcomm-closed-source-components" } ] } } } }, "cveMetadata": { "assignerOrgId": "2cfc7d3e-20d3-47ac-8db7-1b7285aff15f", "assignerShortName": "qualcomm", "cveId": "CVE-2018-5837", "datePublished": "2018-09-20T13:00:00", "dateReserved": "2018-01-19T00:00:00", "dateUpdated": "2024-08-05T05:47:55.801Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201809-0878
Vulnerability from variot
In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20, Snapdragon_High_Med_2016, a potential buffer overflow exists when parsing TFTP options. Snapdragon (Automobile , Mobile , Wear) Contains a vulnerability related to array index validation.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-109678453, A-111089815, A-112279482, A-112278875, A-109678259, A-111088838, A-111092944, A-112278972, A-112279521, A-112279426, A-112279483, A-112279144, A-112279544, and A-119050566. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. There are security vulnerabilities in Storage in several Qualcomm Snapdragon products. The vulnerability stems from the fact that the program does not correctly verify the array index. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201809-0878", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sda660", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm710", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm636", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm660", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm632", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm429", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd845", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm439", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdx20", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm630", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd810", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd435", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd205", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9645", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd820a", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd652", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd427", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9655", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd820", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9635m", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd625", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd210", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd450", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd425", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd212", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd430", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd850", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd835", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9635m", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9645", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9655", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 205", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 210", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 212", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 425", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 427", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 430", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 435", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 450", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 625", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 652", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 810", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 820", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 820a", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 835", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 845", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 850", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sda 660", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 429", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 439", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 630", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 632", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 636", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 660", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm710", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdx20", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "pixel xl", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "pixel c", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "pixel", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "nexus player", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9" }, { "model": "nexus 6p", "scope": null, "trust": 0.3, "vendor": "google", "version": null }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5x" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" } ], "sources": [ { "db": "BID", "id": "106845" }, { "db": "JVNDB", "id": "JVNDB-2018-010814" }, { "db": "CNNVD", "id": "CNNVD-201809-970" }, { "db": "NVD", "id": "CVE-2018-11268" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9635m_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9640_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9645_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9655_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8909w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_205_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_212_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_425_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_427_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_430_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_435_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_450_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_625_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_652_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_810_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_820_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_820a_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_835_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_845_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_850_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sda_660_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_429_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_439_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_630_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_632_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_636_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_660_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_710_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdx20_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010814" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported these issues.", "sources": [ { "db": "BID", "id": "106845" }, { "db": "CNNVD", "id": "CNNVD-201809-970" } ], "trust": 0.9 }, "cve": "CVE-2018-11268", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2018-11268", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-121110", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-11268", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-11268", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2018-11268", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201809-970", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-121110", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-121110" }, { "db": "JVNDB", "id": "JVNDB-2018-010814" }, { "db": "CNNVD", "id": "CNNVD-201809-970" }, { "db": "NVD", "id": "CVE-2018-11268" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20, Snapdragon_High_Med_2016, a potential buffer overflow exists when parsing TFTP options. Snapdragon (Automobile , Mobile , Wear) Contains a vulnerability related to array index validation.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. \nAn attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. \nThese issues are being tracked by Android Bug IDs A-109678453, A-111089815, A-112279482, A-112278875, A-109678259, A-111088838, A-111092944, A-112278972, A-112279521, A-112279426, A-112279483, A-112279144, A-112279544, and A-119050566. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. There are security vulnerabilities in Storage in several Qualcomm Snapdragon products. The vulnerability stems from the fact that the program does not correctly verify the array index. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements", "sources": [ { "db": "NVD", "id": "CVE-2018-11268" }, { "db": "JVNDB", "id": "JVNDB-2018-010814" }, { "db": "BID", "id": "106845" }, { "db": "VULHUB", "id": "VHN-121110" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-11268", "trust": 2.8 }, { "db": "BID", "id": "106845", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2018-010814", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201809-970", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-121110", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-121110" }, { "db": "BID", "id": "106845" }, { "db": "JVNDB", "id": "JVNDB-2018-010814" }, { "db": "CNNVD", "id": "CNNVD-201809-970" }, { "db": "NVD", "id": "CVE-2018-11268" } ] }, "id": "VAR-201809-0878", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-121110" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:06:19.798000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "September 2018 Qualcomm Technologies, Inc. Security Bulletin", "trust": 0.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "title": "Multiple Qualcomm Snapdragon Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85083" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010814" }, { "db": "CNNVD", "id": "CNNVD-201809-970" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-129", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-121110" }, { "db": "JVNDB", "id": "JVNDB-2018-010814" }, { "db": "NVD", "id": "CVE-2018-11268" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/106845" }, { "trust": 1.7, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-11268" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-11268" }, { "trust": 0.3, "url": "http://code.google.com/android/" }, { "trust": 0.3, "url": "http://www.qualcomm.com/" }, { "trust": 0.3, "url": "https://source.android.com/security/bulletin/2019-02-01" } ], "sources": [ { "db": "VULHUB", "id": "VHN-121110" }, { "db": "BID", "id": "106845" }, { "db": "JVNDB", "id": "JVNDB-2018-010814" }, { "db": "CNNVD", "id": "CNNVD-201809-970" }, { "db": "NVD", "id": "CVE-2018-11268" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-121110" }, { "db": "BID", "id": "106845" }, { "db": "JVNDB", "id": "JVNDB-2018-010814" }, { "db": "CNNVD", "id": "CNNVD-201809-970" }, { "db": "NVD", "id": "CVE-2018-11268" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-09-20T00:00:00", "db": "VULHUB", "id": "VHN-121110" }, { "date": "2019-02-04T00:00:00", "db": "BID", "id": "106845" }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010814" }, { "date": "2018-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-970" }, { "date": "2018-09-20T13:29:00.933000", "db": "NVD", "id": "CVE-2018-11268" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-03-05T00:00:00", "db": "VULHUB", "id": "VHN-121110" }, { "date": "2019-02-04T00:00:00", "db": "BID", "id": "106845" }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010814" }, { "date": "2019-03-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-970" }, { "date": "2024-11-21T03:43:01.650000", "db": "NVD", "id": "CVE-2018-11268" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-970" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Snapdragon Vulnerability related to array index verification in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010814" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-970" } ], "trust": 0.6 } }
var-201809-0066
Vulnerability from variot
In Snapdragon (Automobile, Mobile, Wear) in version MDM9607, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SDM429, SDM439, SDM632, Snapdragon_High_Med_2016, when a Trusted Application has opened the SPI/I2C interface to a particular device, it is possible for another Trusted Application to read the data on this open interface by calling the SPI/I2C read function. Snapdragon (Automobile , Mobile , Wear) Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9607, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) for different platforms. An access control error vulnerability exists in Buses in several Qualcomm Snapdragon products. When a trusted application opens the SPI/I2C interface to the device, a local attacker can use other trusted applications to exploit this vulnerability to read data on this open interface
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "sdm439", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd650", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd625", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sdm632", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd820a", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd652", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd617", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sdm429", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd820", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd835", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "msm8996au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd435", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "mdm9607", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd205", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd427", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "msm8909w", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd210", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd450", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd425", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd212", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd430", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "mdm9607", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "msm8909w", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "msm8996au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd 205", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd 210", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd 212", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd 425", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd 427", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd 430", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd 435", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd 450", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd 617", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd 625", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd 650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd 652", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd 820", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd 820a", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd 835", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sdm 429", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sdm 439", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sdm 632", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014290" }, { "db": "CNNVD", "id": "CNNVD-201809-975" }, { "db": "NVD", "id": "CVE-2017-18280" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8909w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_205_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_212_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_425_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_427_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_430_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_435_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_450_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_617_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_625_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_652_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_820_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_820a_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_835_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_429_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_439_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_632_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014290" } ] }, "cve": "CVE-2017-18280", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2017-18280", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-109387", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2017-18280", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-18280", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2017-18280", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201809-975", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-109387", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2017-18280", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-109387" }, { "db": "VULMON", "id": "CVE-2017-18280" }, { "db": "JVNDB", "id": "JVNDB-2017-014290" }, { "db": "CNNVD", "id": "CNNVD-201809-975" }, { "db": "NVD", "id": "CVE-2017-18280" } ] }, "description": { "_id": null, "data": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9607, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SDM429, SDM439, SDM632, Snapdragon_High_Med_2016, when a Trusted Application has opened the SPI/I2C interface to a particular device, it is possible for another Trusted Application to read the data on this open interface by calling the SPI/I2C read function. Snapdragon (Automobile , Mobile , Wear) Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9607, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) for different platforms. An access control error vulnerability exists in Buses in several Qualcomm Snapdragon products. When a trusted application opens the SPI/I2C interface to the device, a local attacker can use other trusted applications to exploit this vulnerability to read data on this open interface", "sources": [ { "db": "NVD", "id": "CVE-2017-18280" }, { "db": "JVNDB", "id": "JVNDB-2017-014290" }, { "db": "VULHUB", "id": "VHN-109387" }, { "db": "VULMON", "id": "CVE-2017-18280" } ], "trust": 1.8 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2017-18280", "trust": 2.6 }, { "db": "SECTRACK", "id": "1041432", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2017-014290", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201809-975", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-109387", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2017-18280", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-109387" }, { "db": "VULMON", "id": "CVE-2017-18280" }, { "db": "JVNDB", "id": "JVNDB-2017-014290" }, { "db": "CNNVD", "id": "CNNVD-201809-975" }, { "db": "NVD", "id": "CVE-2017-18280" } ] }, "id": "VAR-201809-0066", "iot": { "_id": null, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-109387" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T19:52:18.636000Z", "patch": { "_id": null, "data": [ { "title": "Android \u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u516c\u958b\u60c5\u5831 - 2018 \u5e74 8 \u6708", "trust": 0.8, "url": "https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components" }, { "title": "September 2018 Qualcomm Technologies, Inc. Security Bulletin", "trust": 0.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "title": "Multiple Qualcomm Snapdragon Product access control error vulnerability fixes", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85088" }, { "title": "Android Security Bulletins: Android Security Bulletin\u2014August 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=746dc14fcd3f5e139648cfdc9d9039a9" }, { "title": "SamsungReleaseNotes", "trust": 0.1, "url": "https://github.com/samreleasenotes/SamsungReleaseNotes " } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-18280" }, { "db": "JVNDB", "id": "JVNDB-2017-014290" }, { "db": "CNNVD", "id": "CNNVD-201809-975" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-284", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-109387" }, { "db": "JVNDB", "id": "JVNDB-2017-014290" }, { "db": "NVD", "id": "CVE-2017-18280" } ] }, "references": { "_id": null, "data": [ { "trust": 1.8, "url": "https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components" }, { "trust": 1.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1041432" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-18280" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18280" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://source.android.com/security/bulletin/2018-08-01.html" }, { "trust": 0.1, "url": "https://github.com/samreleasenotes/samsungreleasenotes" } ], "sources": [ { "db": "VULHUB", "id": "VHN-109387" }, { "db": "VULMON", "id": "CVE-2017-18280" }, { "db": "JVNDB", "id": "JVNDB-2017-014290" }, { "db": "CNNVD", "id": "CNNVD-201809-975" }, { "db": "NVD", "id": "CVE-2017-18280" } ] }, "sources": { "_id": null, "data": [ { "db": "VULHUB", "id": "VHN-109387", "ident": null }, { "db": "VULMON", "id": "CVE-2017-18280", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2017-014290", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201809-975", "ident": null }, { "db": "NVD", "id": "CVE-2017-18280", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2018-09-20T00:00:00", "db": "VULHUB", "id": "VHN-109387", "ident": null }, { "date": "2018-09-20T00:00:00", "db": "VULMON", "id": "CVE-2017-18280", "ident": null }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-014290", "ident": null }, { "date": "2018-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-975", "ident": null }, { "date": "2018-09-20T13:29:00.247000", "db": "NVD", "id": "CVE-2017-18280", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-109387", "ident": null }, { "date": "2019-10-03T00:00:00", "db": "VULMON", "id": "CVE-2017-18280", "ident": null }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-014290", "ident": null }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-975", "ident": null }, { "date": "2024-11-21T03:19:45.513000", "db": "NVD", "id": "CVE-2017-18280", "ident": null } ] }, "threat_type": { "_id": null, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-975" } ], "trust": 0.6 }, "title": { "_id": null, "data": "plural Snapdragon Access control vulnerabilities in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014290" } ], "trust": 0.8 }, "type": { "_id": null, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-975" } ], "trust": 0.6 } }
var-201809-0861
Vulnerability from variot
In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016, incorrect control flow implementation in Video while checking buffer sufficiency. Snapdragon (Automobile , Mobile , Wear) Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-68326803, A-62213176, A-73539234, A-72950814, A-77484228, A-111090697, A-68326811, A-78240387, A-78239234, A-68326819, A-71501117, A-72950958, A-74236425, A-77484229, A-79419793, A-109677940, A-109677982, A-109677964, A-109678202, A-109678380, A-111091377, A-111090533, A-111093202, A-111090698, A-111093021, and A-111093167. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. Video in several Qualcomm Snapdragon products has a security vulnerability. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201809-0861", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sda660", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm710", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm636", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm660", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm632", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd850", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm429", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd845", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm439", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm630", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd435", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd205", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd820a", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd652", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd427", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd820", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd625", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd210", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd450", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd425", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd212", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd430", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd835", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 205", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 210", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 212", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 425", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 427", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 430", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 435", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 450", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 625", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 652", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 820", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 820a", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 835", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 845", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 850", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sda 660", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 429", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 439", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 630", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 632", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 636", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 660", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm710", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "pixel xl", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "pixel c", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "pixel", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "nexus player", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9" }, { "model": "nexus 6p", "scope": null, "trust": 0.3, "vendor": "google", "version": null }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5x" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" } ], "sources": [ { "db": "BID", "id": "106494" }, { "db": "JVNDB", "id": "JVNDB-2018-010808" }, { "db": "CNNVD", "id": "CNNVD-201809-966" }, { "db": "NVD", "id": "CVE-2018-11287" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8909w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_205_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_212_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_425_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_427_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_430_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_435_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_450_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_625_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_652_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_820_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_820a_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_835_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_845_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_850_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sda_660_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_429_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_439_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_630_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_632_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_636_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_660_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_710_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010808" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported these issues.", "sources": [ { "db": "BID", "id": "106494" } ], "trust": 0.3 }, "cve": "CVE-2018-11287", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2018-11287", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-121131", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2018-11287", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-11287", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2018-11287", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-201809-966", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-121131", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2018-11287", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-121131" }, { "db": "VULMON", "id": "CVE-2018-11287" }, { "db": "JVNDB", "id": "JVNDB-2018-010808" }, { "db": "CNNVD", "id": "CNNVD-201809-966" }, { "db": "NVD", "id": "CVE-2018-11287" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016, incorrect control flow implementation in Video while checking buffer sufficiency. Snapdragon (Automobile , Mobile , Wear) Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. \nAn attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. \nThese issues are being tracked by Android Bug IDs A-68326803, A-62213176, A-73539234, A-72950814, A-77484228, A-111090697, A-68326811, A-78240387, A-78239234, A-68326819, A-71501117, A-72950958, A-74236425, A-77484229, A-79419793, A-109677940, A-109677982, A-109677964, A-109678202, A-109678380, A-111091377, A-111090533, A-111093202, A-111090698, A-111093021, and A-111093167. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. Video in several Qualcomm Snapdragon products has a security vulnerability. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements", "sources": [ { "db": "NVD", "id": "CVE-2018-11287" }, { "db": "JVNDB", "id": "JVNDB-2018-010808" }, { "db": "BID", "id": "106494" }, { "db": "VULHUB", "id": "VHN-121131" }, { "db": "VULMON", "id": "CVE-2018-11287" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-11287", "trust": 2.9 }, { "db": "JVNDB", "id": "JVNDB-2018-010808", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201809-966", "trust": 0.7 }, { "db": "BID", "id": "106494", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-121131", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-11287", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-121131" }, { "db": "VULMON", "id": "CVE-2018-11287" }, { "db": "BID", "id": "106494" }, { "db": "JVNDB", "id": "JVNDB-2018-010808" }, { "db": "CNNVD", "id": "CNNVD-201809-966" }, { "db": "NVD", "id": "CVE-2018-11287" } ] }, "id": "VAR-201809-0861", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-121131" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:52:42.463000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Android \u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u516c\u958b\u60c5\u5831 - 2018 \u5e74 9 \u6708", "trust": 0.8, "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "title": "September 2018 Qualcomm Technologies, Inc. Security Bulletin", "trust": 0.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "title": "Multiple Qualcomm Snapdragon Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85079" }, { "title": "Android Security Bulletins: Android Security Bulletin\u2014September 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=25cebb27b25b2e242f56769472d26cc5" }, { "title": "SamsungReleaseNotes", "trust": 0.1, "url": "https://github.com/samreleasenotes/SamsungReleaseNotes " } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-11287" }, { "db": "JVNDB", "id": "JVNDB-2018-010808" }, { "db": "CNNVD", "id": "CNNVD-201809-966" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-121131" }, { "db": "JVNDB", "id": "JVNDB-2018-010808" }, { "db": "NVD", "id": "CVE-2018-11287" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "trust": 1.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-11287" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-11287" }, { "trust": 0.4, "url": "https://source.android.com/security/bulletin/2018-09-01.html" }, { "trust": 0.3, "url": "http://code.google.com/android/" }, { "trust": 0.3, "url": "http://www.qualcomm.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/samreleasenotes/samsungreleasenotes" } ], "sources": [ { "db": "VULHUB", "id": "VHN-121131" }, { "db": "VULMON", "id": "CVE-2018-11287" }, { "db": "BID", "id": "106494" }, { "db": "JVNDB", "id": "JVNDB-2018-010808" }, { "db": "CNNVD", "id": "CNNVD-201809-966" }, { "db": "NVD", "id": "CVE-2018-11287" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-121131" }, { "db": "VULMON", "id": "CVE-2018-11287" }, { "db": "BID", "id": "106494" }, { "db": "JVNDB", "id": "JVNDB-2018-010808" }, { "db": "CNNVD", "id": "CNNVD-201809-966" }, { "db": "NVD", "id": "CVE-2018-11287" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-09-20T00:00:00", "db": "VULHUB", "id": "VHN-121131" }, { "date": "2018-09-20T00:00:00", "db": "VULMON", "id": "CVE-2018-11287" }, { "date": "2018-09-04T00:00:00", "db": "BID", "id": "106494" }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010808" }, { "date": "2018-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-966" }, { "date": "2018-09-20T13:29:01.403000", "db": "NVD", "id": "CVE-2018-11287" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-11-23T00:00:00", "db": "VULHUB", "id": "VHN-121131" }, { "date": "2018-11-23T00:00:00", "db": "VULMON", "id": "CVE-2018-11287" }, { "date": "2018-09-04T00:00:00", "db": "BID", "id": "106494" }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010808" }, { "date": "2018-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-966" }, { "date": "2024-11-21T03:43:03.690000", "db": "NVD", "id": "CVE-2018-11287" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-966" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Snapdragon Vulnerability related to input validation in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010808" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-966" } ], "trust": 0.6 } }
var-201809-1108
Vulnerability from variot
In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016, MAC address randomization performed during probe requests (for privacy reasons) is not done properly due to a flawed RNG which produces repeating output much earlier than expected. Snapdragon (Automobile , Mobile , Wear) Contains a cryptographic vulnerability.Information may be tampered with. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-68326803, A-62213176, A-73539234, A-72950814, A-77484228, A-111090697, A-68326811, A-78240387, A-78239234, A-68326819, A-71501117, A-72950958, A-74236425, A-77484229, A-79419793, A-109677940, A-109677982, A-109677964, A-109678202, A-109678380, A-111091377, A-111090533, A-111093202, A-111090698, A-111093021, and A-111093167. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. An encryption issue vulnerability exists in several Qualcomm Snapdragon products due to a program that does not properly randomize MAC addresses. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201809-1108", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sda660", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm710", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm636", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm660", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm632", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd850", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm429", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd845", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm439", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm630", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd435", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd616", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd205", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd820a", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qca6574au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd427", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd652", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd415", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd210", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd450", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd425", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd615", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd212", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd430", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd835", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "qca6574au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 205", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 210", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 212", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 415", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 425", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 427", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 430", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 435", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 450", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 615", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 616", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 652", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 820a", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 835", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 845", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 850", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sda 660", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 429", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 439", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 630", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 632", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 636", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 660", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm710", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "pixel xl", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "pixel c", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "pixel", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "nexus player", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9" }, { "model": "nexus 6p", "scope": null, "trust": 0.3, "vendor": "google", "version": null }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5x" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" } ], "sources": [ { "db": "BID", "id": "106494" }, { "db": "JVNDB", "id": "JVNDB-2018-010802" }, { "db": "CNNVD", "id": "CNNVD-201809-960" }, { "db": "NVD", "id": "CVE-2018-5871" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9640_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qca6574au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_205_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_212_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_415_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_425_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_427_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_430_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_435_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_450_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_615_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_616_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_652_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_820a_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_835_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_845_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_850_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sda_660_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_429_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_439_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_630_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_632_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_636_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_660_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_710_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010802" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported these issues.", "sources": [ { "db": "BID", "id": "106494" } ], "trust": 0.3 }, "cve": "CVE-2018-5871", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CVE-2018-5871", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 1.9, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "VHN-135903", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2018-5871", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-5871", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2018-5871", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201809-960", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-135903", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2018-5871", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-135903" }, { "db": "VULMON", "id": "CVE-2018-5871" }, { "db": "JVNDB", "id": "JVNDB-2018-010802" }, { "db": "CNNVD", "id": "CNNVD-201809-960" }, { "db": "NVD", "id": "CVE-2018-5871" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016, MAC address randomization performed during probe requests (for privacy reasons) is not done properly due to a flawed RNG which produces repeating output much earlier than expected. Snapdragon (Automobile , Mobile , Wear) Contains a cryptographic vulnerability.Information may be tampered with. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. \nAn attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. \nThese issues are being tracked by Android Bug IDs A-68326803, A-62213176, A-73539234, A-72950814, A-77484228, A-111090697, A-68326811, A-78240387, A-78239234, A-68326819, A-71501117, A-72950958, A-74236425, A-77484229, A-79419793, A-109677940, A-109677982, A-109677964, A-109678202, A-109678380, A-111091377, A-111090533, A-111093202, A-111090698, A-111093021, and A-111093167. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. An encryption issue vulnerability exists in several Qualcomm Snapdragon products due to a program that does not properly randomize MAC addresses. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements", "sources": [ { "db": "NVD", "id": "CVE-2018-5871" }, { "db": "JVNDB", "id": "JVNDB-2018-010802" }, { "db": "BID", "id": "106494" }, { "db": "VULHUB", "id": "VHN-135903" }, { "db": "VULMON", "id": "CVE-2018-5871" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-5871", "trust": 2.9 }, { "db": "JVNDB", "id": "JVNDB-2018-010802", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201809-960", "trust": 0.7 }, { "db": "BID", "id": "106494", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-135903", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-5871", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-135903" }, { "db": "VULMON", "id": "CVE-2018-5871" }, { "db": "BID", "id": "106494" }, { "db": "JVNDB", "id": "JVNDB-2018-010802" }, { "db": "CNNVD", "id": "CNNVD-201809-960" }, { "db": "NVD", "id": "CVE-2018-5871" } ] }, "id": "VAR-201809-1108", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-135903" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:52:41.988000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "September 2018 Qualcomm Technologies, Inc. Security Bulletin", "trust": 0.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "title": "Multiple Qualcomm Snapdragon Product encryption problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85073" }, { "title": "Android Security Bulletins: Android Security Bulletin\u2014September 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=25cebb27b25b2e242f56769472d26cc5" }, { "title": "SamsungReleaseNotes", "trust": 0.1, "url": "https://github.com/samreleasenotes/SamsungReleaseNotes " } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-5871" }, { "db": "JVNDB", "id": "JVNDB-2018-010802" }, { "db": "CNNVD", "id": "CNNVD-201809-960" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-338", "trust": 1.1 }, { "problemtype": "CWE-310", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-135903" }, { "db": "JVNDB", "id": "JVNDB-2018-010802" }, { "db": "NVD", "id": "CVE-2018-5871" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "trust": 1.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5871" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5871" }, { "trust": 0.4, "url": "https://source.android.com/security/bulletin/2018-09-01.html" }, { "trust": 0.3, "url": "http://code.google.com/android/" }, { "trust": 0.3, "url": "http://www.qualcomm.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/338.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/samreleasenotes/samsungreleasenotes" } ], "sources": [ { "db": "VULHUB", "id": "VHN-135903" }, { "db": "VULMON", "id": "CVE-2018-5871" }, { "db": "BID", "id": "106494" }, { "db": "JVNDB", "id": "JVNDB-2018-010802" }, { "db": "CNNVD", "id": "CNNVD-201809-960" }, { "db": "NVD", "id": "CVE-2018-5871" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-135903" }, { "db": "VULMON", "id": "CVE-2018-5871" }, { "db": "BID", "id": "106494" }, { "db": "JVNDB", "id": "JVNDB-2018-010802" }, { "db": "CNNVD", "id": "CNNVD-201809-960" }, { "db": "NVD", "id": "CVE-2018-5871" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-09-20T00:00:00", "db": "VULHUB", "id": "VHN-135903" }, { "date": "2018-09-20T00:00:00", "db": "VULMON", "id": "CVE-2018-5871" }, { "date": "2018-09-04T00:00:00", "db": "BID", "id": "106494" }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010802" }, { "date": "2018-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-960" }, { "date": "2018-09-20T13:29:02.323000", "db": "NVD", "id": "CVE-2018-5871" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-135903" }, { "date": "2019-10-03T00:00:00", "db": "VULMON", "id": "CVE-2018-5871" }, { "date": "2018-09-04T00:00:00", "db": "BID", "id": "106494" }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010802" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-960" }, { "date": "2024-11-21T04:09:35.340000", "db": "NVD", "id": "CVE-2018-5871" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-960" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Qualcomm Snapdragon Cryptographic vulnerabilities in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010802" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "security feature problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-960" } ], "trust": 0.6 } }
var-201809-0049
Vulnerability from variot
In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, Snapdragon_High_Med_2016, on TZ cold boot the CNOC_QDSS RG0 locked by xBL_SEC is cleared by TZ. Snapdragon (Automobile , Mobile , Wear) Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-68326803, A-62213176, A-73539234, A-72950814, A-77484228, A-111090697, A-68326811, A-78240387, A-78239234, A-68326819, A-71501117, A-72950958, A-74236425, A-77484229, A-79419793, A-109677940, A-109677982, A-109677964, A-109678202, A-109678380, A-111091377, A-111090533, A-111093202, A-111090698, A-111093021, and A-111093167. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. An access control error vulnerability exists in several Qualcomm Snapdragon products. Attackers can use TZ to exploit this vulnerability to clear CNOC_QDSS RG0 locked by xBL_SEC when TZ is cold started
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201809-0049", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sdm439", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sda660", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm636", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm660", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm632", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd820a", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm429", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd835", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd820", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm630", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd617", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd810", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd435", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd616", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd205", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9645", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd652", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd427", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9655", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd412", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9635m", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd410", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd415", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd210", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd625", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd450", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd425", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd615", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd212", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd430", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9635m", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9645", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9655", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 205", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 210", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 212", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 410", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 412", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 415", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 425", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 427", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 430", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 435", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 450", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 615", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 616", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 617", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 625", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 652", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 810", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 820", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 820a", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 835", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sda 660", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 429", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 439", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 630", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 632", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 636", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 660", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "pixel xl", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "pixel c", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "pixel", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "nexus player", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9" }, { "model": "nexus 6p", "scope": null, "trust": 0.3, "vendor": "google", "version": null }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5x" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" } ], "sources": [ { "db": "BID", "id": "106494" }, { "db": "JVNDB", "id": "JVNDB-2017-014293" }, { "db": "CNNVD", "id": "CNNVD-201809-972" }, { "db": "NVD", "id": "CVE-2017-18314" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9635m_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9640_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9645_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9655_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8909w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_205_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_212_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_410_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_412_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_415_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_425_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_427_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_430_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_435_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_450_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_615_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_616_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_617_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_625_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_652_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_810_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_820_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_820a_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_835_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sda_660_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_429_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_439_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_630_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_632_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_636_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_660_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014293" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported these issues.", "sources": [ { "db": "BID", "id": "106494" } ], "trust": 0.3 }, "cve": "CVE-2017-18314", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2017-18314", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-109424", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2017-18314", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-18314", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2017-18314", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-201809-972", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-109424", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2017-18314", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-109424" }, { "db": "VULMON", "id": "CVE-2017-18314" }, { "db": "JVNDB", "id": "JVNDB-2017-014293" }, { "db": "CNNVD", "id": "CNNVD-201809-972" }, { "db": "NVD", "id": "CVE-2017-18314" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, Snapdragon_High_Med_2016, on TZ cold boot the CNOC_QDSS RG0 locked by xBL_SEC is cleared by TZ. Snapdragon (Automobile , Mobile , Wear) Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. \nAn attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. \nThese issues are being tracked by Android Bug IDs A-68326803, A-62213176, A-73539234, A-72950814, A-77484228, A-111090697, A-68326811, A-78240387, A-78239234, A-68326819, A-71501117, A-72950958, A-74236425, A-77484229, A-79419793, A-109677940, A-109677982, A-109677964, A-109678202, A-109678380, A-111091377, A-111090533, A-111093202, A-111090698, A-111093021, and A-111093167. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. An access control error vulnerability exists in several Qualcomm Snapdragon products. Attackers can use TZ to exploit this vulnerability to clear CNOC_QDSS RG0 locked by xBL_SEC when TZ is cold started", "sources": [ { "db": "NVD", "id": "CVE-2017-18314" }, { "db": "JVNDB", "id": "JVNDB-2017-014293" }, { "db": "BID", "id": "106494" }, { "db": "VULHUB", "id": "VHN-109424" }, { "db": "VULMON", "id": "CVE-2017-18314" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-18314", "trust": 2.9 }, { "db": "JVNDB", "id": "JVNDB-2017-014293", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201809-972", "trust": 0.7 }, { "db": "BID", "id": "106494", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-109424", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2017-18314", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-109424" }, { "db": "VULMON", "id": "CVE-2017-18314" }, { "db": "BID", "id": "106494" }, { "db": "JVNDB", "id": "JVNDB-2017-014293" }, { "db": "CNNVD", "id": "CNNVD-201809-972" }, { "db": "NVD", "id": "CVE-2017-18314" } ] }, "id": "VAR-201809-0049", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-109424" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:52:46.292000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Android \u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u516c\u958b\u60c5\u5831 - 2018 \u5e74 9 \u6708", "trust": 0.8, "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "title": "September 2018 Qualcomm Technologies, Inc. Security Bulletin", "trust": 0.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "title": "Multiple Qualcomm Snapdragon Product access control error vulnerability fixes", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85085" }, { "title": "Android Security Bulletins: Android Security Bulletin\u2014September 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=25cebb27b25b2e242f56769472d26cc5" }, { "title": "SamsungReleaseNotes", "trust": 0.1, "url": "https://github.com/samreleasenotes/SamsungReleaseNotes " } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-18314" }, { "db": "JVNDB", "id": "JVNDB-2017-014293" }, { "db": "CNNVD", "id": "CNNVD-201809-972" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-284", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-109424" }, { "db": "JVNDB", "id": "JVNDB-2017-014293" }, { "db": "NVD", "id": "CVE-2017-18314" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "trust": 1.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-18314" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18314" }, { "trust": 0.4, "url": "https://source.android.com/security/bulletin/2018-09-01.html" }, { "trust": 0.3, "url": "http://code.google.com/android/" }, { "trust": 0.3, "url": "http://www.qualcomm.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/samreleasenotes/samsungreleasenotes" } ], "sources": [ { "db": "VULHUB", "id": "VHN-109424" }, { "db": "VULMON", "id": "CVE-2017-18314" }, { "db": "BID", "id": "106494" }, { "db": "JVNDB", "id": "JVNDB-2017-014293" }, { "db": "CNNVD", "id": "CNNVD-201809-972" }, { "db": "NVD", "id": "CVE-2017-18314" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-109424" }, { "db": "VULMON", "id": "CVE-2017-18314" }, { "db": "BID", "id": "106494" }, { "db": "JVNDB", "id": "JVNDB-2017-014293" }, { "db": "CNNVD", "id": "CNNVD-201809-972" }, { "db": "NVD", "id": "CVE-2017-18314" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-09-20T00:00:00", "db": "VULHUB", "id": "VHN-109424" }, { "date": "2018-09-20T00:00:00", "db": "VULMON", "id": "CVE-2017-18314" }, { "date": "2018-09-04T00:00:00", "db": "BID", "id": "106494" }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-014293" }, { "date": "2018-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-972" }, { "date": "2018-09-20T13:29:00.667000", "db": "NVD", "id": "CVE-2017-18314" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-109424" }, { "date": "2019-10-03T00:00:00", "db": "VULMON", "id": "CVE-2017-18314" }, { "date": "2018-09-04T00:00:00", "db": "BID", "id": "106494" }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-014293" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-972" }, { "date": "2024-11-21T03:19:50.143000", "db": "NVD", "id": "CVE-2017-18314" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-972" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Snapdragon Access control vulnerabilities in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014293" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-972" } ], "trust": 0.6 } }
var-201809-0862
Vulnerability from variot
In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, QCA6584, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 820A, SD 845, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDX20, Snapdragon_High_Med_2016, MAC address randomization performed during probe requests is not done properly due to a flawed RNG in use. Snapdragon (Automobile , Mobile , Wear) Contains a cryptographic vulnerability.Information may be tampered with. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-68326803, A-62213176, A-73539234, A-72950814, A-77484228, A-111090697, A-68326811, A-78240387, A-78239234, A-68326819, A-71501117, A-72950958, A-74236425, A-77484229, A-79419793, A-109677940, A-109677982, A-109677964, A-109678202, A-109678380, A-111091377, A-111090533, A-111093202, A-111090698, A-111093021, and A-111093167. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. A cryptographic vulnerability exists in several Qualcomm Snapdragon products due to the program's use of a flawed random number generator. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201809-0862", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sdm636", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm660", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm632", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "qca6584", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd820a", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm429", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd845", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm439", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdx20", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm630", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd435", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd205", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qca6574au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd427", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd652", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd625", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd210", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd450", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd425", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd212", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd430", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "qca6574au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "qca6584", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 205", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 210", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 212", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "pixel xl", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "pixel c", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "pixel", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "nexus player", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9" }, { "model": "nexus 6p", "scope": null, "trust": 0.3, "vendor": "google", "version": null }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5x" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" } ], "sources": [ { "db": "BID", "id": "106494" }, { "db": "JVNDB", "id": "JVNDB-2018-013510" }, { "db": "CNNVD", "id": "CNNVD-201809-965" }, { "db": "NVD", "id": "CVE-2018-11290" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9640_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qca6574au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qca6584_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_205_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_212_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013510" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported these issues.", "sources": [ { "db": "BID", "id": "106494" } ], "trust": 0.3 }, "cve": "CVE-2018-11290", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2018-11290", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-121135", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2018-11290", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-11290", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2018-11290", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201809-965", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-121135", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2018-11290", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-121135" }, { "db": "VULMON", "id": "CVE-2018-11290" }, { "db": "JVNDB", "id": "JVNDB-2018-013510" }, { "db": "CNNVD", "id": "CNNVD-201809-965" }, { "db": "NVD", "id": "CVE-2018-11290" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, QCA6584, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 820A, SD 845, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDX20, Snapdragon_High_Med_2016, MAC address randomization performed during probe requests is not done properly due to a flawed RNG in use. Snapdragon (Automobile , Mobile , Wear) Contains a cryptographic vulnerability.Information may be tampered with. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. \nAn attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. \nThese issues are being tracked by Android Bug IDs A-68326803, A-62213176, A-73539234, A-72950814, A-77484228, A-111090697, A-68326811, A-78240387, A-78239234, A-68326819, A-71501117, A-72950958, A-74236425, A-77484229, A-79419793, A-109677940, A-109677982, A-109677964, A-109678202, A-109678380, A-111091377, A-111090533, A-111093202, A-111090698, A-111093021, and A-111093167. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. A cryptographic vulnerability exists in several Qualcomm Snapdragon products due to the program\u0027s use of a flawed random number generator. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements", "sources": [ { "db": "NVD", "id": "CVE-2018-11290" }, { "db": "JVNDB", "id": "JVNDB-2018-013510" }, { "db": "BID", "id": "106494" }, { "db": "VULHUB", "id": "VHN-121135" }, { "db": "VULMON", "id": "CVE-2018-11290" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-11290", "trust": 2.9 }, { "db": "JVNDB", "id": "JVNDB-2018-013510", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201809-965", "trust": 0.7 }, { "db": "BID", "id": "106494", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-121135", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-11290", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-121135" }, { "db": "VULMON", "id": "CVE-2018-11290" }, { "db": "BID", "id": "106494" }, { "db": "JVNDB", "id": "JVNDB-2018-013510" }, { "db": "CNNVD", "id": "CNNVD-201809-965" }, { "db": "NVD", "id": "CVE-2018-11290" } ] }, "id": "VAR-201809-0862", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-121135" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:52:41.703000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Android \u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u516c\u958b\u60c5\u5831 - 2018 \u5e74 9 \u6708", "trust": 0.8, "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "title": "September 2018 Qualcomm Technologies, Inc. Security Bulletin", "trust": 0.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "title": "Multiple Qualcomm Snapdragon Product encryption problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85078" }, { "title": "Android Security Bulletins: Android Security Bulletin\u2014September 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=25cebb27b25b2e242f56769472d26cc5" }, { "title": "SamsungReleaseNotes", "trust": 0.1, "url": "https://github.com/samreleasenotes/SamsungReleaseNotes " } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-11290" }, { "db": "JVNDB", "id": "JVNDB-2018-013510" }, { "db": "CNNVD", "id": "CNNVD-201809-965" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-338", "trust": 1.1 }, { "problemtype": "CWE-310", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-121135" }, { "db": "JVNDB", "id": "JVNDB-2018-013510" }, { "db": "NVD", "id": "CVE-2018-11290" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "trust": 1.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "trust": 1.7, "url": "http://support.blackberry.com/kb/articledetail?language=en_us\u0026articlenumber=000051618" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-11290" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-11290" }, { "trust": 0.4, "url": "https://source.android.com/security/bulletin/2018-09-01.html" }, { "trust": 0.3, "url": "http://code.google.com/android/" }, { "trust": 0.3, "url": "http://www.qualcomm.com/" }, { "trust": 0.1, "url": "http://support.blackberry.com/kb/articledetail?language=en_us\u0026amp;articlenumber=000051618" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/338.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/samreleasenotes/samsungreleasenotes" } ], "sources": [ { "db": "VULHUB", "id": "VHN-121135" }, { "db": "VULMON", "id": "CVE-2018-11290" }, { "db": "BID", "id": "106494" }, { "db": "JVNDB", "id": "JVNDB-2018-013510" }, { "db": "CNNVD", "id": "CNNVD-201809-965" }, { "db": "NVD", "id": "CVE-2018-11290" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-121135" }, { "db": "VULMON", "id": "CVE-2018-11290" }, { "db": "BID", "id": "106494" }, { "db": "JVNDB", "id": "JVNDB-2018-013510" }, { "db": "CNNVD", "id": "CNNVD-201809-965" }, { "db": "NVD", "id": "CVE-2018-11290" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-09-20T00:00:00", "db": "VULHUB", "id": "VHN-121135" }, { "date": "2018-09-20T00:00:00", "db": "VULMON", "id": "CVE-2018-11290" }, { "date": "2018-09-04T00:00:00", "db": "BID", "id": "106494" }, { "date": "2019-02-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013510" }, { "date": "2018-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-965" }, { "date": "2018-09-20T13:29:01.543000", "db": "NVD", "id": "CVE-2018-11290" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-121135" }, { "date": "2019-10-03T00:00:00", "db": "VULMON", "id": "CVE-2018-11290" }, { "date": "2018-09-04T00:00:00", "db": "BID", "id": "106494" }, { "date": "2019-02-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013510" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-965" }, { "date": "2024-11-21T03:43:04.467000", "db": "NVD", "id": "CVE-2018-11290" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-965" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Snapdragon Product Cryptographic vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013510" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "security feature problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-965" } ], "trust": 0.6 } }
var-201810-0054
Vulnerability from variot
Non-secure SW can cause SDCC to generate secure bus accesses, which may expose RPM access in Snapdragon Mobile, Snapdragon Wear in version MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 835, SDA660. Snapdragon Mobile and Snapdragon Wear Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. Access Control module is one of the access control modules. An input validation vulnerability exists in the Access Control module in several Qualcomm Snapdragon products. An attacker could exploit this vulnerability to gain access to RPM
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "sd450", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sda660", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd650", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd625", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd652", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd430", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "mdm9650", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "mdm9206", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "mdm9607", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd835", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd210", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd425", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd205", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd212", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "mdm9206", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "mdm9607", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "mdm9650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd 205", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd 210", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd 212", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd 425", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd 430", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd 450", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd 625", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd 650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd 652", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sd 835", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "_id": null, "model": "sda 660", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014299" }, { "db": "CNNVD", "id": "CNNVD-201810-1151" }, { "db": "NVD", "id": "CVE-2017-18282" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_205_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_212_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_425_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_430_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_450_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_625_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_652_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_835_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sda_660_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014299" } ] }, "cve": "CVE-2017-18282", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2017-18282", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-109389", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2017-18282", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-18282", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2017-18282", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201810-1151", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-109389", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2017-18282", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-109389" }, { "db": "VULMON", "id": "CVE-2017-18282" }, { "db": "JVNDB", "id": "JVNDB-2017-014299" }, { "db": "CNNVD", "id": "CNNVD-201810-1151" }, { "db": "NVD", "id": "CVE-2017-18282" } ] }, "description": { "_id": null, "data": "Non-secure SW can cause SDCC to generate secure bus accesses, which may expose RPM access in Snapdragon Mobile, Snapdragon Wear in version MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 835, SDA660. Snapdragon Mobile and Snapdragon Wear Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. Access Control module is one of the access control modules. An input validation vulnerability exists in the Access Control module in several Qualcomm Snapdragon products. An attacker could exploit this vulnerability to gain access to RPM", "sources": [ { "db": "NVD", "id": "CVE-2017-18282" }, { "db": "JVNDB", "id": "JVNDB-2017-014299" }, { "db": "VULHUB", "id": "VHN-109389" }, { "db": "VULMON", "id": "CVE-2017-18282" } ], "trust": 1.8 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2017-18282", "trust": 2.6 }, { "db": "SECTRACK", "id": "1041432", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2017-014299", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201810-1151", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-109389", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2017-18282", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-109389" }, { "db": "VULMON", "id": "CVE-2017-18282" }, { "db": "JVNDB", "id": "JVNDB-2017-014299" }, { "db": "CNNVD", "id": "CNNVD-201810-1151" }, { "db": "NVD", "id": "CVE-2017-18282" } ] }, "id": "VAR-201810-0054", "iot": { "_id": null, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-109389" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T20:20:29.142000Z", "patch": { "_id": null, "data": [ { "title": "October 2018 Qualcomm Technologies, Inc. Security Bulletin", "trust": 0.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "title": "Multiple Qualcomm Snapdragon product Access Control Fixes for module input validation vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86249" }, { "title": "Android Security Bulletins: Android Security Bulletin\u2014August 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=746dc14fcd3f5e139648cfdc9d9039a9" }, { "title": "SamsungReleaseNotes", "trust": 0.1, "url": "https://github.com/samreleasenotes/SamsungReleaseNotes " } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-18282" }, { "db": "JVNDB", "id": "JVNDB-2017-014299" }, { "db": "CNNVD", "id": "CNNVD-201810-1151" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-284", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-109389" }, { "db": "JVNDB", "id": "JVNDB-2017-014299" }, { "db": "NVD", "id": "CVE-2017-18282" } ] }, "references": { "_id": null, "data": [ { "trust": 1.8, "url": "https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components" }, { "trust": 1.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1041432" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-18282" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18282" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://source.android.com/security/bulletin/2018-08-01.html" }, { "trust": 0.1, "url": "https://github.com/samreleasenotes/samsungreleasenotes" } ], "sources": [ { "db": "VULHUB", "id": "VHN-109389" }, { "db": "VULMON", "id": "CVE-2017-18282" }, { "db": "JVNDB", "id": "JVNDB-2017-014299" }, { "db": "CNNVD", "id": "CNNVD-201810-1151" }, { "db": "NVD", "id": "CVE-2017-18282" } ] }, "sources": { "_id": null, "data": [ { "db": "VULHUB", "id": "VHN-109389", "ident": null }, { "db": "VULMON", "id": "CVE-2017-18282", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2017-014299", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201810-1151", "ident": null }, { "db": "NVD", "id": "CVE-2017-18282", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2018-10-23T00:00:00", "db": "VULHUB", "id": "VHN-109389", "ident": null }, { "date": "2018-10-23T00:00:00", "db": "VULMON", "id": "CVE-2017-18282", "ident": null }, { "date": "2019-01-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-014299", "ident": null }, { "date": "2018-10-24T00:00:00", "db": "CNNVD", "id": "CNNVD-201810-1151", "ident": null }, { "date": "2018-10-23T13:29:00.837000", "db": "NVD", "id": "CVE-2017-18282", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-109389", "ident": null }, { "date": "2019-10-03T00:00:00", "db": "VULMON", "id": "CVE-2017-18282", "ident": null }, { "date": "2019-01-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-014299", "ident": null }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201810-1151", "ident": null }, { "date": "2024-11-21T03:19:45.800000", "db": "NVD", "id": "CVE-2017-18282", "ident": null } ] }, "threat_type": { "_id": null, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201810-1151" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Snapdragon Mobile and Snapdragon Wear Access control vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014299" } ], "trust": 0.8 }, "type": { "_id": null, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201810-1151" } ], "trust": 0.6 } }
var-201810-0052
Vulnerability from variot
When dynamic memory allocation fails, currently the process sleeps for one second and continues with infinite loop without retrying for memory allocation in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in version MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, QCN5502, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 600, SD 615/16/SD 415, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835. Snapdragon Automobile , Snapdragon Mobile , Snapdragon Wear Contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-78240792, A-78240715, A-78240449, A-78240612, A-78240794, A-78240199, A-78240071, A-78240736, A-78242049, A-78241971, A-78241834, A-78241375, A-68989823, A-72951265, A-74235874, A-74236406, A-77485022, A-77485183, A-77485139, A-77483830, and A-77484449. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. WLAN is one of the wireless local area network components. A security vulnerability exists in WLAN in several Qualcomm Snapdragon products. An attacker could exploit this vulnerability to cause a denial of service (infinite loop)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201810-0052", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "qcn5502", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd 415", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 205", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 212", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 835", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 652", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 425", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 820a", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 615", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 810", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 820", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 450", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 616", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 600", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 430", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 210", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd 625", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "qcn5502", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 205", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 210", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 212", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 415", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 425", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 430", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 450", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 600", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 615", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 616", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 625", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 652", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 810", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 820", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 820a", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 835", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd425", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sd212", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sd210", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "sd205", "scope": "eq", "trust": 0.6, "vendor": "qualcomm", "version": null }, { "model": "pixel xl", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "pixel c", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "pixel", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "nexus player", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9" }, { "model": "nexus 6p", "scope": null, "trust": 0.3, "vendor": "google", "version": null }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5x" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" } ], "sources": [ { "db": "BID", "id": "104760" }, { "db": "JVNDB", "id": "JVNDB-2017-014298" }, { "db": "CNNVD", "id": "CNNVD-201810-1150" }, { "db": "NVD", "id": "CVE-2017-18277" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9640_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8909w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qcn5502_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_205_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_212_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_415_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_425_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_430_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_450_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_600_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_615_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_616_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_625_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_652_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_810_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_820_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_820a_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_835_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014298" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported these issues.", "sources": [ { "db": "BID", "id": "104760" } ], "trust": 0.3 }, "cve": "CVE-2017-18277", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2017-18277", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-109383", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2017-18277", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-18277", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2017-18277", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201810-1150", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-109383", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2017-18277", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-109383" }, { "db": "VULMON", "id": "CVE-2017-18277" }, { "db": "JVNDB", "id": "JVNDB-2017-014298" }, { "db": "CNNVD", "id": "CNNVD-201810-1150" }, { "db": "NVD", "id": "CVE-2017-18277" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "When dynamic memory allocation fails, currently the process sleeps for one second and continues with infinite loop without retrying for memory allocation in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in version MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, QCN5502, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 600, SD 615/16/SD 415, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835. Snapdragon Automobile , Snapdragon Mobile , Snapdragon Wear Contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. \nAn attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. \nThese issues are being tracked by Android Bug IDs A-78240792, A-78240715, A-78240449, A-78240612, A-78240794, A-78240199, A-78240071, A-78240736, A-78242049, A-78241971, A-78241834, A-78241375, A-68989823, A-72951265, A-74235874, A-74236406, A-77485022, A-77485183, A-77485139, A-77483830, and A-77484449. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. WLAN is one of the wireless local area network components. A security vulnerability exists in WLAN in several Qualcomm Snapdragon products. An attacker could exploit this vulnerability to cause a denial of service (infinite loop)", "sources": [ { "db": "NVD", "id": "CVE-2017-18277" }, { "db": "JVNDB", "id": "JVNDB-2017-014298" }, { "db": "BID", "id": "104760" }, { "db": "VULHUB", "id": "VHN-109383" }, { "db": "VULMON", "id": "CVE-2017-18277" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-18277", "trust": 2.9 }, { "db": "JVNDB", "id": "JVNDB-2017-014298", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201810-1150", "trust": 0.7 }, { "db": "BID", "id": "104760", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-109383", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2017-18277", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-109383" }, { "db": "VULMON", "id": "CVE-2017-18277" }, { "db": "BID", "id": "104760" }, { "db": "JVNDB", "id": "JVNDB-2017-014298" }, { "db": "CNNVD", "id": "CNNVD-201810-1150" }, { "db": "NVD", "id": "CVE-2017-18277" } ] }, "id": "VAR-201810-0052", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-109383" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:38:38.281000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "October 2018 Qualcomm Technologies, Inc. Security Bulletin", "trust": 0.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "title": "Multiple Qualcomm Snapdragon product WLAN Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86248" }, { "title": "Android Security Bulletins: Android Security Bulletin\u2014July 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=25584b3d319ca9e7cb2fae9ec5dbf5e0" }, { "title": "SamsungReleaseNotes", "trust": 0.1, "url": "https://github.com/samreleasenotes/SamsungReleaseNotes " } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-18277" }, { "db": "JVNDB", "id": "JVNDB-2017-014298" }, { "db": "CNNVD", "id": "CNNVD-201810-1150" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-835", "trust": 1.1 }, { "problemtype": "CWE-400", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-109383" }, { "db": "JVNDB", "id": "JVNDB-2017-014298" }, { "db": "NVD", "id": "CVE-2017-18277" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://source.android.com/security/bulletin/2018-07-01#qualcomm-closed-source-components" }, { "trust": 1.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-18277" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18277" }, { "trust": 0.3, "url": "http://code.google.com/android/" }, { "trust": 0.3, "url": "http://www.qualcomm.com/" }, { "trust": 0.3, "url": "https://source.android.com/security/bulletin/2018-07-01" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/835.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://source.android.com/security/bulletin/2018-07-01.html" }, { "trust": 0.1, "url": "https://github.com/samreleasenotes/samsungreleasenotes" } ], "sources": [ { "db": "VULHUB", "id": "VHN-109383" }, { "db": "VULMON", "id": "CVE-2017-18277" }, { "db": "BID", "id": "104760" }, { "db": "JVNDB", "id": "JVNDB-2017-014298" }, { "db": "CNNVD", "id": "CNNVD-201810-1150" }, { "db": "NVD", "id": "CVE-2017-18277" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-109383" }, { "db": "VULMON", "id": "CVE-2017-18277" }, { "db": "BID", "id": "104760" }, { "db": "JVNDB", "id": "JVNDB-2017-014298" }, { "db": "CNNVD", "id": "CNNVD-201810-1150" }, { "db": "NVD", "id": "CVE-2017-18277" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-23T00:00:00", "db": "VULHUB", "id": "VHN-109383" }, { "date": "2018-10-23T00:00:00", "db": "VULMON", "id": "CVE-2017-18277" }, { "date": "2018-07-02T00:00:00", "db": "BID", "id": "104760" }, { "date": "2019-01-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-014298" }, { "date": "2018-10-24T00:00:00", "db": "CNNVD", "id": "CNNVD-201810-1150" }, { "date": "2018-10-23T13:29:00.680000", "db": "NVD", "id": "CVE-2017-18277" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-109383" }, { "date": "2019-10-03T00:00:00", "db": "VULMON", "id": "CVE-2017-18277" }, { "date": "2018-07-02T00:00:00", "db": "BID", "id": "104760" }, { "date": "2019-01-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-014298" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201810-1150" }, { "date": "2024-11-21T03:19:45.063000", "db": "NVD", "id": "CVE-2017-18277" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201810-1150" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Snapdragon Product depletion vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-014298" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201810-1150" } ], "trust": 0.6 } }
var-201809-0098
Vulnerability from variot
In Snapdragon (Mobile, Wear) in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 835, Snapdragon_High_Med_2016, a double free of ASN1 heap memory used for EUTRA CAP container occurs during UTRAN to LTE Capability inquiry procedure. Snapdragon (Mobile and Wear) Contains a double release vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. A double free vulnerability exists in several Qualcomm Snapdragon products. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201809-0098", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sd450", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd810", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd415", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd650", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd625", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd652", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd617", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd820", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd616", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd835", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd435", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd205", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9645", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd427", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9655", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd412", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9635m", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd410", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd210", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd425", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd615", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd212", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd430", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9635m", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9645", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9655", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 205", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 210", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 212", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 410", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 412", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 415", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 425", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 427", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 430", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 435", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 450", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 615", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 616", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 617", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 625", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 652", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 810", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 820", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 835", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010805" }, { "db": "CNNVD", "id": "CNNVD-201809-962" }, { "db": "NVD", "id": "CVE-2018-11982" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9635m_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9640_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9645_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9655_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8909w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_205_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_212_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_410_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_412_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_415_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_425_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_427_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_430_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_435_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_450_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_615_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_616_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_617_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_625_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_652_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_810_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_820_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_835_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010805" } ] }, "cve": "CVE-2018-11982", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "id": "CVE-2018-11982", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "id": "VHN-121896", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2018-11982", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-11982", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2018-11982", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201809-962", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-121896", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-121896" }, { "db": "JVNDB", "id": "JVNDB-2018-010805" }, { "db": "CNNVD", "id": "CNNVD-201809-962" }, { "db": "NVD", "id": "CVE-2018-11982" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Snapdragon (Mobile, Wear) in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 835, Snapdragon_High_Med_2016, a double free of ASN1 heap memory used for EUTRA CAP container occurs during UTRAN to LTE Capability inquiry procedure. Snapdragon (Mobile and Wear) Contains a double release vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. A double free vulnerability exists in several Qualcomm Snapdragon products. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements", "sources": [ { "db": "NVD", "id": "CVE-2018-11982" }, { "db": "JVNDB", "id": "JVNDB-2018-010805" }, { "db": "VULHUB", "id": "VHN-121896" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-11982", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2018-010805", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201809-962", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-121896", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-121896" }, { "db": "JVNDB", "id": "JVNDB-2018-010805" }, { "db": "CNNVD", "id": "CNNVD-201809-962" }, { "db": "NVD", "id": "CVE-2018-11982" } ] }, "id": "VAR-201809-0098", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-121896" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:52:50.821000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "September 2018 Qualcomm Technologies, Inc. Security Bulletin", "trust": 0.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "title": "Multiple Qualcomm Snapdragon Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85075" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010805" }, { "db": "CNNVD", "id": "CNNVD-201809-962" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-415", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-121896" }, { "db": "JVNDB", "id": "JVNDB-2018-010805" }, { "db": "NVD", "id": "CVE-2018-11982" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-11982" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-11982" } ], "sources": [ { "db": "VULHUB", "id": "VHN-121896" }, { "db": "JVNDB", "id": "JVNDB-2018-010805" }, { "db": "CNNVD", "id": "CNNVD-201809-962" }, { "db": "NVD", "id": "CVE-2018-11982" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-121896" }, { "db": "JVNDB", "id": "JVNDB-2018-010805" }, { "db": "CNNVD", "id": "CNNVD-201809-962" }, { "db": "NVD", "id": "CVE-2018-11982" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-09-20T00:00:00", "db": "VULHUB", "id": "VHN-121896" }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010805" }, { "date": "2018-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-962" }, { "date": "2018-09-20T13:29:02.057000", "db": "NVD", "id": "CVE-2018-11982" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-11-23T00:00:00", "db": "VULHUB", "id": "VHN-121896" }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010805" }, { "date": "2018-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-962" }, { "date": "2024-11-21T03:44:21.940000", "db": "NVD", "id": "CVE-2018-11982" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "specific network environment", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-962" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Snapdragon Double release vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010805" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-962" } ], "trust": 0.6 } }
var-201809-0877
Vulnerability from variot
In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9615, MDM9640, MDM9650, MDM9655, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 600, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDX20, Snapdragon_High_Med_2016, when sending an malformed XML data to deviceprogrammer/firehose it may do an out of bounds buffer write allowing a region of memory to be filled with 0x20. Snapdragon (Automobile , Mobile , Wear) Contains a vulnerability related to array index validation.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-78135902, A-66913713, A-67712316, A-79419833, A-109678200, A-78283451, A-78285196, A-78284194, A-78284753, A-78284517, A-78240177, A-78239686, A-78284545, A-109660689, A-78240324, A-68141338, A-78286046, A-73539037, A-73539235, A-71501115, A-33757308, A-74236942, A-77485184, A-77484529, A-33385206, A-79419639, A-79420511, A-109678338, and A-112279564. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. The Core in several Qualcomm Snapdragon products has a security vulnerability. The vulnerability is caused by the program not validating the array index correctly. Attackers can exploit this vulnerability by sending malformed XML data to deviceprogrammer/firehose to cause buffer out-of-bounds writes
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201809-0877", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sda660", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm636", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm660", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm632", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd850", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm429", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd845", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm439", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdx20", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm630", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd617", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd616", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9615", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd820a", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd652", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd427", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9655", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd820", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd410", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd625", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd210", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd450", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd212", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd430", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd600", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd435", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd205", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "snapdragon high med 2016", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd412", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd415", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd425", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd615", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd835", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9655", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 205", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 210", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 212", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 410", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 412", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 415", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 425", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 427", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 430", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 435", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 450", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 600", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 615", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 616", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 617", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 625", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 652", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 820", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 820a", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 835", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 845", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 850", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sda 660", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 429", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 439", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 630", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 632", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 636", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 660", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdx20", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "pixel xl", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "pixel c", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "pixel", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "nexus player", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9" }, { "model": "nexus 6p", "scope": null, "trust": 0.3, "vendor": "google", "version": null }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5x" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" } ], "sources": [ { "db": "BID", "id": "106128" }, { "db": "JVNDB", "id": "JVNDB-2018-010813" }, { "db": "CNNVD", "id": "CNNVD-201809-971" }, { "db": "NVD", "id": "CVE-2018-11267" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9640_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9655_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_205_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_212_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_410_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_412_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_415_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_425_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_427_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_430_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_435_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_450_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_600_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_615_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_616_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_617_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_625_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_652_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_820_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_820a_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_835_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_845_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_850_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sda_660_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_429_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_439_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_630_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_632_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_636_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_660_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdx20_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010813" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported these issues.", "sources": [ { "db": "BID", "id": "106128" }, { "db": "CNNVD", "id": "CNNVD-201809-971" } ], "trust": 0.9 }, "cve": "CVE-2018-11267", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2018-11267", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-121109", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-11267", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-11267", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2018-11267", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201809-971", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-121109", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2018-11267", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-121109" }, { "db": "VULMON", "id": "CVE-2018-11267" }, { "db": "JVNDB", "id": "JVNDB-2018-010813" }, { "db": "CNNVD", "id": "CNNVD-201809-971" }, { "db": "NVD", "id": "CVE-2018-11267" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9615, MDM9640, MDM9650, MDM9655, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 600, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDX20, Snapdragon_High_Med_2016, when sending an malformed XML data to deviceprogrammer/firehose it may do an out of bounds buffer write allowing a region of memory to be filled with 0x20. Snapdragon (Automobile , Mobile , Wear) Contains a vulnerability related to array index validation.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. \nAn attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. \nThese issues are being tracked by Android Bug IDs A-78135902, A-66913713, A-67712316, A-79419833, A-109678200, A-78283451, A-78285196, A-78284194, A-78284753, A-78284517, A-78240177, A-78239686, A-78284545, A-109660689, A-78240324, A-68141338, A-78286046, A-73539037, A-73539235, A-71501115, A-33757308, A-74236942, A-77485184, A-77484529, A-33385206, A-79419639, A-79420511, A-109678338, and A-112279564. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. The Core in several Qualcomm Snapdragon products has a security vulnerability. The vulnerability is caused by the program not validating the array index correctly. Attackers can exploit this vulnerability by sending malformed XML data to deviceprogrammer/firehose to cause buffer out-of-bounds writes", "sources": [ { "db": "NVD", "id": "CVE-2018-11267" }, { "db": "JVNDB", "id": "JVNDB-2018-010813" }, { "db": "BID", "id": "106128" }, { "db": "VULHUB", "id": "VHN-121109" }, { "db": "VULMON", "id": "CVE-2018-11267" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-11267", "trust": 2.9 }, { "db": "BID", "id": "106128", "trust": 2.1 }, { "db": "JVNDB", "id": "JVNDB-2018-010813", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201809-971", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-121109", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-11267", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-121109" }, { "db": "VULMON", "id": "CVE-2018-11267" }, { "db": "BID", "id": "106128" }, { "db": "JVNDB", "id": "JVNDB-2018-010813" }, { "db": "CNNVD", "id": "CNNVD-201809-971" }, { "db": "NVD", "id": "CVE-2018-11267" } ] }, "id": "VAR-201809-0877", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-121109" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T19:26:57.866000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "September 2018 Qualcomm Technologies, Inc. Security Bulletin", "trust": 0.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "title": "Multiple Qualcomm Snapdragon Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85084" }, { "title": "Android Security Bulletins: Android Security Bulletin\u2014December 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=90af33430b981dd4da141cb90e5f3889" } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-11267" }, { "db": "JVNDB", "id": "JVNDB-2018-010813" }, { "db": "CNNVD", "id": "CNNVD-201809-971" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-129", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-121109" }, { "db": "JVNDB", "id": "JVNDB-2018-010813" }, { "db": "NVD", "id": "CVE-2018-11267" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/106128" }, { "trust": 1.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "trust": 1.0, "url": "https://source.android.com/security/bulletin/2018-12-01.html" }, { "trust": 0.9, "url": "http://code.google.com/android/" }, { "trust": 0.9, "url": "http://www.qualcomm.com/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-11267" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-11267" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/129.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-121109" }, { "db": "VULMON", "id": "CVE-2018-11267" }, { "db": "BID", "id": "106128" }, { "db": "JVNDB", "id": "JVNDB-2018-010813" }, { "db": "CNNVD", "id": "CNNVD-201809-971" }, { "db": "NVD", "id": "CVE-2018-11267" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-121109" }, { "db": "VULMON", "id": "CVE-2018-11267" }, { "db": "BID", "id": "106128" }, { "db": "JVNDB", "id": "JVNDB-2018-010813" }, { "db": "CNNVD", "id": "CNNVD-201809-971" }, { "db": "NVD", "id": "CVE-2018-11267" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-09-20T00:00:00", "db": "VULHUB", "id": "VHN-121109" }, { "date": "2018-09-20T00:00:00", "db": "VULMON", "id": "CVE-2018-11267" }, { "date": "2018-12-03T00:00:00", "db": "BID", "id": "106128" }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010813" }, { "date": "2018-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-971" }, { "date": "2018-09-20T13:29:00.807000", "db": "NVD", "id": "CVE-2018-11267" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-03-06T00:00:00", "db": "VULHUB", "id": "VHN-121109" }, { "date": "2019-03-06T00:00:00", "db": "VULMON", "id": "CVE-2018-11267" }, { "date": "2018-12-03T00:00:00", "db": "BID", "id": "106128" }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010813" }, { "date": "2019-04-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-971" }, { "date": "2024-11-21T03:43:01.500000", "db": "NVD", "id": "CVE-2018-11267" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-971" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Snapdragon Vulnerability related to array index verification in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010813" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-971" } ], "trust": 0.6 } }
var-201809-1106
Vulnerability from variot
In Snapdragon (Automobile, Mobile, Wear) in version IPQ8074, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016, MAC address randomization performed during probe requests is not done properly due to a flawed RNG which produced repeating output much earlier than expected. Snapdragon (Automobile , Mobile , Wear) Contains a cryptographic vulnerability.Information may be tampered with. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-78240792, A-78240715, A-78240449, A-78240612, A-78240794, A-78240199, A-78240071, A-78240736, A-78242049, A-78241971, A-78241834, A-78241375, A-68989823, A-72951265, A-74235874, A-74236406, A-77485022, A-77485183, A-77485139, A-77483830, and A-77484449. Qualcomm IPQ8074, etc. are all central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. An encryption issue vulnerability exists in several Qualcomm Snapdragon products due to a program that does not properly randomize MAC addresses. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201809-1106", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sda660", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm710", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm636", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm660", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm632", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd850", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm429", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd845", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm439", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm630", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd435", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd205", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd820a", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qca6574au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd427", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "ipq8074", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd625", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd210", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd450", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd425", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd212", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd430", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd835", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "ipq8074", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "qca6574au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 205", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 210", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 212", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 425", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 427", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 430", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 435", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 450", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 625", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 820a", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 835", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 845", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 850", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sda 660", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 429", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 439", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 630", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 632", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 636", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 660", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm710", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "pixel xl", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "pixel c", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "pixel", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "nexus player", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9" }, { "model": "nexus 6p", "scope": null, "trust": 0.3, "vendor": "google", "version": null }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5x" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" } ], "sources": [ { "db": "BID", "id": "104760" }, { "db": "JVNDB", "id": "JVNDB-2018-010801" }, { "db": "CNNVD", "id": "CNNVD-201809-961" }, { "db": "NVD", "id": "CVE-2018-5837" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:ipq8074_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9640_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qca6574au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_205_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_212_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_425_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_427_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_430_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_435_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_450_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_625_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_820a_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_835_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_845_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_850_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sda_660_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_429_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_439_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_630_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_632_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_636_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_660_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_710_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010801" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported these issues.", "sources": [ { "db": "BID", "id": "104760" } ], "trust": 0.3 }, "cve": "CVE-2018-5837", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2018-5837", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-135869", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2018-5837", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-5837", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2018-5837", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201809-961", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-135869", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2018-5837", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-135869" }, { "db": "VULMON", "id": "CVE-2018-5837" }, { "db": "JVNDB", "id": "JVNDB-2018-010801" }, { "db": "CNNVD", "id": "CNNVD-201809-961" }, { "db": "NVD", "id": "CVE-2018-5837" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Snapdragon (Automobile, Mobile, Wear) in version IPQ8074, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016, MAC address randomization performed during probe requests is not done properly due to a flawed RNG which produced repeating output much earlier than expected. Snapdragon (Automobile , Mobile , Wear) Contains a cryptographic vulnerability.Information may be tampered with. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. \nAn attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. \nThese issues are being tracked by Android Bug IDs A-78240792, A-78240715, A-78240449, A-78240612, A-78240794, A-78240199, A-78240071, A-78240736, A-78242049, A-78241971, A-78241834, A-78241375, A-68989823, A-72951265, A-74235874, A-74236406, A-77485022, A-77485183, A-77485139, A-77483830, and A-77484449. Qualcomm IPQ8074, etc. are all central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. An encryption issue vulnerability exists in several Qualcomm Snapdragon products due to a program that does not properly randomize MAC addresses. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements", "sources": [ { "db": "NVD", "id": "CVE-2018-5837" }, { "db": "JVNDB", "id": "JVNDB-2018-010801" }, { "db": "BID", "id": "104760" }, { "db": "VULHUB", "id": "VHN-135869" }, { "db": "VULMON", "id": "CVE-2018-5837" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-5837", "trust": 2.9 }, { "db": "JVNDB", "id": "JVNDB-2018-010801", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201809-961", "trust": 0.7 }, { "db": "BID", "id": "104760", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-135869", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-5837", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-135869" }, { "db": "VULMON", "id": "CVE-2018-5837" }, { "db": "BID", "id": "104760" }, { "db": "JVNDB", "id": "JVNDB-2018-010801" }, { "db": "CNNVD", "id": "CNNVD-201809-961" }, { "db": "NVD", "id": "CVE-2018-5837" } ] }, "id": "VAR-201809-1106", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-135869" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:38:38.103000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Android Security Bulletin-July 2018", "trust": 0.8, "url": "https://source.android.com/security/bulletin/2018-07-01#qualcomm-closed-source-components" }, { "title": "September 2018 Qualcomm Technologies, Inc. Security Bulletin", "trust": 0.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "title": "Multiple Qualcomm Snapdragon Product encryption problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85074" }, { "title": "Android Security Bulletins: Android Security Bulletin\u2014July 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=25584b3d319ca9e7cb2fae9ec5dbf5e0" }, { "title": "SamsungReleaseNotes", "trust": 0.1, "url": "https://github.com/samreleasenotes/SamsungReleaseNotes " } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-5837" }, { "db": "JVNDB", "id": "JVNDB-2018-010801" }, { "db": "CNNVD", "id": "CNNVD-201809-961" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-338", "trust": 1.1 }, { "problemtype": "CWE-310", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-135869" }, { "db": "JVNDB", "id": "JVNDB-2018-010801" }, { "db": "NVD", "id": "CVE-2018-5837" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://source.android.com/security/bulletin/2018-07-01#qualcomm-closed-source-components" }, { "trust": 1.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5837" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5837" }, { "trust": 0.3, "url": "http://code.google.com/android/" }, { "trust": 0.3, "url": "http://www.qualcomm.com/" }, { "trust": 0.3, "url": "https://source.android.com/security/bulletin/2018-07-01" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/338.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://source.android.com/security/bulletin/2018-07-01.html" }, { "trust": 0.1, "url": "https://github.com/samreleasenotes/samsungreleasenotes" } ], "sources": [ { "db": "VULHUB", "id": "VHN-135869" }, { "db": "VULMON", "id": "CVE-2018-5837" }, { "db": "BID", "id": "104760" }, { "db": "JVNDB", "id": "JVNDB-2018-010801" }, { "db": "CNNVD", "id": "CNNVD-201809-961" }, { "db": "NVD", "id": "CVE-2018-5837" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-135869" }, { "db": "VULMON", "id": "CVE-2018-5837" }, { "db": "BID", "id": "104760" }, { "db": "JVNDB", "id": "JVNDB-2018-010801" }, { "db": "CNNVD", "id": "CNNVD-201809-961" }, { "db": "NVD", "id": "CVE-2018-5837" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-09-20T00:00:00", "db": "VULHUB", "id": "VHN-135869" }, { "date": "2018-09-20T00:00:00", "db": "VULMON", "id": "CVE-2018-5837" }, { "date": "2018-07-02T00:00:00", "db": "BID", "id": "104760" }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010801" }, { "date": "2018-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-961" }, { "date": "2018-09-20T13:29:02.167000", "db": "NVD", "id": "CVE-2018-5837" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-135869" }, { "date": "2019-10-03T00:00:00", "db": "VULMON", "id": "CVE-2018-5837" }, { "date": "2018-07-02T00:00:00", "db": "BID", "id": "104760" }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010801" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-961" }, { "date": "2024-11-21T04:09:30.517000", "db": "NVD", "id": "CVE-2018-5837" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-961" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Qualcomm Snapdragon Cryptographic vulnerabilities in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010801" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "security feature problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-961" } ], "trust": 0.6 } }
var-201809-0864
Vulnerability from variot
In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCA6574AU, QCA6584, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820A, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, Snapdragon_High_Med_2016, lack of input validation in WLANWMI command handlers can lead to integer & heap overflows. Snapdragon (Automobile , Mobile , Wear) Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-68326803, A-62213176, A-73539234, A-72950814, A-77484228, A-111090697, A-68326811, A-78240387, A-78239234, A-68326819, A-71501117, A-72950958, A-74236425, A-77484229, A-79419793, A-109677940, A-109677982, A-109677964, A-109678202, A-109678380, A-111091377, A-111090533, A-111093202, A-111090698, A-111093021, and A-111093167. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. A buffer overflow vulnerability exists in several Qualcomm Snapdragon products where the WLANWMI command handler does not perform input validation. An attacker could exploit this vulnerability to cause a denial of service or execute code
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201809-0864", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sdm636", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd650", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm660", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm632", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd625", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd820a", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd652", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm429", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm439", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm630", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd616", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd205", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qca6574au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd427", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd412", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qca6584", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd410", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd210", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd415", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd450", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd425", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd615", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd212", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd430", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "qca6574au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "qca6584", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 205", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 210", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 212", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 410", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 412", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 415", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 425", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 427", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 430", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 450", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 615", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 616", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 625", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 652", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 820a", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 429", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 439", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 630", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 632", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 636", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 660", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "pixel xl", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "pixel c", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "pixel", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "nexus player", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9" }, { "model": "nexus 6p", "scope": null, "trust": 0.3, "vendor": "google", "version": null }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5x" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" } ], "sources": [ { "db": "BID", "id": "106494" }, { "db": "JVNDB", "id": "JVNDB-2018-010804" }, { "db": "CNNVD", "id": "CNNVD-201809-963" }, { "db": "NVD", "id": "CVE-2018-11292" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9640_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8909w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qca6574au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qca6584_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_205_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_212_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_410_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_412_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_415_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_425_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_427_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_430_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_450_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_615_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_616_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_625_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_652_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_820a_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_429_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_439_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_630_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_632_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_636_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_660_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010804" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported these issues.", "sources": [ { "db": "BID", "id": "106494" } ], "trust": 0.3 }, "cve": "CVE-2018-11292", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2018-11292", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-121137", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-11292", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-11292", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2018-11292", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201809-963", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-121137", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2018-11292", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-121137" }, { "db": "VULMON", "id": "CVE-2018-11292" }, { "db": "JVNDB", "id": "JVNDB-2018-010804" }, { "db": "CNNVD", "id": "CNNVD-201809-963" }, { "db": "NVD", "id": "CVE-2018-11292" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCA6574AU, QCA6584, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820A, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, Snapdragon_High_Med_2016, lack of input validation in WLANWMI command handlers can lead to integer \u0026 heap overflows. Snapdragon (Automobile , Mobile , Wear) Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. \nAn attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. \nThese issues are being tracked by Android Bug IDs A-68326803, A-62213176, A-73539234, A-72950814, A-77484228, A-111090697, A-68326811, A-78240387, A-78239234, A-68326819, A-71501117, A-72950958, A-74236425, A-77484229, A-79419793, A-109677940, A-109677982, A-109677964, A-109678202, A-109678380, A-111091377, A-111090533, A-111093202, A-111090698, A-111093021, and A-111093167. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. A buffer overflow vulnerability exists in several Qualcomm Snapdragon products where the WLANWMI command handler does not perform input validation. An attacker could exploit this vulnerability to cause a denial of service or execute code", "sources": [ { "db": "NVD", "id": "CVE-2018-11292" }, { "db": "JVNDB", "id": "JVNDB-2018-010804" }, { "db": "BID", "id": "106494" }, { "db": "VULHUB", "id": "VHN-121137" }, { "db": "VULMON", "id": "CVE-2018-11292" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-11292", "trust": 2.9 }, { "db": "JVNDB", "id": "JVNDB-2018-010804", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201809-963", "trust": 0.7 }, { "db": "BID", "id": "106494", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-121137", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-11292", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-121137" }, { "db": "VULMON", "id": "CVE-2018-11292" }, { "db": "BID", "id": "106494" }, { "db": "JVNDB", "id": "JVNDB-2018-010804" }, { "db": "CNNVD", "id": "CNNVD-201809-963" }, { "db": "NVD", "id": "CVE-2018-11292" } ] }, "id": "VAR-201809-0864", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-121137" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:52:41.881000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "September 2018 Qualcomm Technologies, Inc. Security Bulletin", "trust": 0.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "title": "Multiple Qualcomm Snapdragon Product Buffer Error Vulnerability Fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85076" }, { "title": "Android Security Bulletins: Android Security Bulletin\u2014September 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=25cebb27b25b2e242f56769472d26cc5" }, { "title": "SamsungReleaseNotes", "trust": 0.1, "url": "https://github.com/samreleasenotes/SamsungReleaseNotes " } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-11292" }, { "db": "JVNDB", "id": "JVNDB-2018-010804" }, { "db": "CNNVD", "id": "CNNVD-201809-963" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-119", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-121137" }, { "db": "JVNDB", "id": "JVNDB-2018-010804" }, { "db": "NVD", "id": "CVE-2018-11292" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "trust": 1.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "trust": 1.7, "url": "http://support.blackberry.com/kb/articledetail?language=en_us\u0026articlenumber=000051618" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-11292" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-11292" }, { "trust": 0.4, "url": "https://source.android.com/security/bulletin/2018-09-01.html" }, { "trust": 0.3, "url": "http://code.google.com/android/" }, { "trust": 0.3, "url": "http://www.qualcomm.com/" }, { "trust": 0.1, "url": "http://support.blackberry.com/kb/articledetail?language=en_us\u0026amp;articlenumber=000051618" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/190.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/samreleasenotes/samsungreleasenotes" } ], "sources": [ { "db": "VULHUB", "id": "VHN-121137" }, { "db": "VULMON", "id": "CVE-2018-11292" }, { "db": "BID", "id": "106494" }, { "db": "JVNDB", "id": "JVNDB-2018-010804" }, { "db": "CNNVD", "id": "CNNVD-201809-963" }, { "db": "NVD", "id": "CVE-2018-11292" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-121137" }, { "db": "VULMON", "id": "CVE-2018-11292" }, { "db": "BID", "id": "106494" }, { "db": "JVNDB", "id": "JVNDB-2018-010804" }, { "db": "CNNVD", "id": "CNNVD-201809-963" }, { "db": "NVD", "id": "CVE-2018-11292" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-09-20T00:00:00", "db": "VULHUB", "id": "VHN-121137" }, { "date": "2018-09-20T00:00:00", "db": "VULMON", "id": "CVE-2018-11292" }, { "date": "2018-09-04T00:00:00", "db": "BID", "id": "106494" }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010804" }, { "date": "2018-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-963" }, { "date": "2018-09-20T13:29:01.823000", "db": "NVD", "id": "CVE-2018-11292" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-24T00:00:00", "db": "VULHUB", "id": "VHN-121137" }, { "date": "2020-08-24T00:00:00", "db": "VULMON", "id": "CVE-2018-11292" }, { "date": "2018-09-04T00:00:00", "db": "BID", "id": "106494" }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010804" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-963" }, { "date": "2024-11-21T03:43:04.800000", "db": "NVD", "id": "CVE-2018-11292" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-963" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Qualcomm Snapdragon Product buffer error vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010804" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-963" } ], "trust": 0.6 } }
var-201809-0879
Vulnerability from variot
In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20, Snapdragon_High_Med_2016, a potential buffer overflow exists when parsing TFTP options. Snapdragon (Automobile , Mobile , Wear) Contains an array index validation vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-78244877, A-79420111, A-109677962, A-68326808, A-78240714, A-78240675, A-78241957, A-72950294, A-74235967, A-77484722, A-77484786, A-79420492, A-79420096, and A-109678529. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. There are security vulnerabilities in Storage in several Qualcomm Snapdragon products. The vulnerability stems from the fact that the program does not correctly verify the array index. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201809-0879", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sda660", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm710", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm636", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm660", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm632", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd850", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm429", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdx20", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm439", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm630", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd810", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd435", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd205", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9645", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd820a", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd652", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd427", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9655", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd820", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9635m", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd625", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd210", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd450", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd845", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd425", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd212", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd430", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd835", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9635m", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9645", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9655", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 205", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 210", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 212", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 425", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 427", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 430", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 435", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 450", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 625", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 652", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 810", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 820", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 820a", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 835", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 845", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 850", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sda 660", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 429", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 439", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 630", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 632", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 636", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 660", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm710", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdx20", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "pixel xl", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "pixel c", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "pixel", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "nexus player", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9" }, { "model": "nexus 6p", "scope": null, "trust": 0.3, "vendor": "google", "version": null }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5x" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" } ], "sources": [ { "db": "BID", "id": "105838" }, { "db": "JVNDB", "id": "JVNDB-2018-010815" }, { "db": "CNNVD", "id": "CNNVD-201809-969" }, { "db": "NVD", "id": "CVE-2018-11269" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9635m_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9640_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9645_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9655_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8909w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_205_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_212_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_425_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_427_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_430_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_435_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_450_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_625_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_652_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_810_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_820_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_820a_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_835_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_845_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_850_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sda_660_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_429_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_439_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_630_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_632_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_636_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_660_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_710_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdx20_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010815" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported these issues.", "sources": [ { "db": "BID", "id": "105838" } ], "trust": 0.3 }, "cve": "CVE-2018-11269", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2018-11269", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-121111", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-11269", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-11269", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2018-11269", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201809-969", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-121111", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2018-11269", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-121111" }, { "db": "VULMON", "id": "CVE-2018-11269" }, { "db": "JVNDB", "id": "JVNDB-2018-010815" }, { "db": "CNNVD", "id": "CNNVD-201809-969" }, { "db": "NVD", "id": "CVE-2018-11269" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20, Snapdragon_High_Med_2016, a potential buffer overflow exists when parsing TFTP options. Snapdragon (Automobile , Mobile , Wear) Contains an array index validation vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. \nAn attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. \nThese issues are being tracked by Android Bug IDs A-78244877, A-79420111, A-109677962, A-68326808, A-78240714, A-78240675, A-78241957, A-72950294, A-74235967, A-77484722, A-77484786, A-79420492, A-79420096, and A-109678529. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. There are security vulnerabilities in Storage in several Qualcomm Snapdragon products. The vulnerability stems from the fact that the program does not correctly verify the array index. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements", "sources": [ { "db": "NVD", "id": "CVE-2018-11269" }, { "db": "JVNDB", "id": "JVNDB-2018-010815" }, { "db": "BID", "id": "105838" }, { "db": "VULHUB", "id": "VHN-121111" }, { "db": "VULMON", "id": "CVE-2018-11269" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-11269", "trust": 2.9 }, { "db": "BID", "id": "105838", "trust": 1.5 }, { "db": "JVNDB", "id": "JVNDB-2018-010815", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201809-969", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-121111", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-11269", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-121111" }, { "db": "VULMON", "id": "CVE-2018-11269" }, { "db": "BID", "id": "105838" }, { "db": "JVNDB", "id": "JVNDB-2018-010815" }, { "db": "CNNVD", "id": "CNNVD-201809-969" }, { "db": "NVD", "id": "CVE-2018-11269" } ] }, "id": "VAR-201809-0879", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-121111" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:00:18.472000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "September 2018 Qualcomm Technologies, Inc. Security Bulletin", "trust": 0.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "title": "Multiple Qualcomm Snapdragon Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85082" }, { "title": "Android Security Bulletins: Android Security Bulletin\u2014November 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=2a07dd9b0f590517e161812c849b67e5" } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-11269" }, { "db": "JVNDB", "id": "JVNDB-2018-010815" }, { "db": "CNNVD", "id": "CNNVD-201809-969" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-129", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-121111" }, { "db": "JVNDB", "id": "JVNDB-2018-010815" }, { "db": "NVD", "id": "CVE-2018-11269" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "trust": 1.3, "url": "http://www.securityfocus.com/bid/105838" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-11269" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-11269" }, { "trust": 0.4, "url": "https://source.android.com/security/bulletin/2018-11-01.html" }, { "trust": 0.3, "url": "http://code.google.com/android/" }, { "trust": 0.3, "url": "http://www.qualcomm.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/129.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-121111" }, { "db": "VULMON", "id": "CVE-2018-11269" }, { "db": "BID", "id": "105838" }, { "db": "JVNDB", "id": "JVNDB-2018-010815" }, { "db": "CNNVD", "id": "CNNVD-201809-969" }, { "db": "NVD", "id": "CVE-2018-11269" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-121111" }, { "db": "VULMON", "id": "CVE-2018-11269" }, { "db": "BID", "id": "105838" }, { "db": "JVNDB", "id": "JVNDB-2018-010815" }, { "db": "CNNVD", "id": "CNNVD-201809-969" }, { "db": "NVD", "id": "CVE-2018-11269" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-09-20T00:00:00", "db": "VULHUB", "id": "VHN-121111" }, { "date": "2018-09-20T00:00:00", "db": "VULMON", "id": "CVE-2018-11269" }, { "date": "2018-11-05T00:00:00", "db": "BID", "id": "105838" }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010815" }, { "date": "2018-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-969" }, { "date": "2018-09-20T13:29:01.043000", "db": "NVD", "id": "CVE-2018-11269" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-11-23T00:00:00", "db": "VULHUB", "id": "VHN-121111" }, { "date": "2018-11-23T00:00:00", "db": "VULMON", "id": "CVE-2018-11269" }, { "date": "2018-11-05T00:00:00", "db": "BID", "id": "105838" }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010815" }, { "date": "2018-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-969" }, { "date": "2024-11-21T03:43:01.800000", "db": "NVD", "id": "CVE-2018-11269" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-969" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Snapdragon Vulnerability in sequence index validation in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010815" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-969" } ], "trust": 0.6 } }
var-201809-0886
Vulnerability from variot
In Snapdragon (Automobile, Mobile, Wear) in version MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SDA660, the com.qualcomm.embms is a vendor package deployed in the system image which has an inadequate permission level and allows any application installed from Play Store to request this permission at install-time. The system application interfaces with the Radio Interface Layer leading to potential access control issue. Snapdragon (Automobile , Mobile , Wear) Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MSM8909W, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) for different platforms. Permissions and access control vulnerabilities exist in Telephony in several Qualcomm Snapdragon products. The vulnerability stems from the fact that com.qualcomm.embms is deployed in a system image with improper permissions and allows any installed application from the Play Store to request permissions. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201809-0886", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sd810", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sda660", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd650", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd625", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd820a", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd652", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd617", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd845", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd820", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd835", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd616", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd205", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd415", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd210", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd450", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd615", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd212", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd430", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 205", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 210", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 212", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 415", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 430", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 450", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 615", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 616", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 617", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 625", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 652", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 810", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 820", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 820a", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 835", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sda 660", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010806" }, { "db": "CNNVD", "id": "CNNVD-201809-968" }, { "db": "NVD", "id": "CVE-2018-11277" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:msm8909w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_205_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_212_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_415_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_430_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_450_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_615_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_616_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_617_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_625_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_652_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_810_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_820_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_820a_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_835_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sda_660_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010806" } ] }, "cve": "CVE-2018-11277", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2018-11277", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-121120", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-11277", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-11277", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2018-11277", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201809-968", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-121120", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-121120" }, { "db": "JVNDB", "id": "JVNDB-2018-010806" }, { "db": "CNNVD", "id": "CNNVD-201809-968" }, { "db": "NVD", "id": "CVE-2018-11277" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Snapdragon (Automobile, Mobile, Wear) in version MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SDA660, the com.qualcomm.embms is a vendor package deployed in the system image which has an inadequate permission level and allows any application installed from Play Store to request this permission at install-time. The system application interfaces with the Radio Interface Layer leading to potential access control issue. Snapdragon (Automobile , Mobile , Wear) Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MSM8909W, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) for different platforms. Permissions and access control vulnerabilities exist in Telephony in several Qualcomm Snapdragon products. The vulnerability stems from the fact that com.qualcomm.embms is deployed in a system image with improper permissions and allows any installed application from the Play Store to request permissions. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements", "sources": [ { "db": "NVD", "id": "CVE-2018-11277" }, { "db": "JVNDB", "id": "JVNDB-2018-010806" }, { "db": "VULHUB", "id": "VHN-121120" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-11277", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2018-010806", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201809-968", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-121120", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-121120" }, { "db": "JVNDB", "id": "JVNDB-2018-010806" }, { "db": "CNNVD", "id": "CNNVD-201809-968" }, { "db": "NVD", "id": "CVE-2018-11277" } ] }, "id": "VAR-201809-0886", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-121120" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:30:17.496000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "September 2018 Qualcomm Technologies, Inc. Security Bulletin", "trust": 0.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "title": "Multiple Qualcomm Snapdragon Product Privilege License and Access Control Vulnerability Fixes", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85081" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010806" }, { "db": "CNNVD", "id": "CNNVD-201809-968" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-732", "trust": 1.1 }, { "problemtype": "CWE-264", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-121120" }, { "db": "JVNDB", "id": "JVNDB-2018-010806" }, { "db": "NVD", "id": "CVE-2018-11277" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-11277" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-11277" } ], "sources": [ { "db": "VULHUB", "id": "VHN-121120" }, { "db": "JVNDB", "id": "JVNDB-2018-010806" }, { "db": "CNNVD", "id": "CNNVD-201809-968" }, { "db": "NVD", "id": "CVE-2018-11277" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-121120" }, { "db": "JVNDB", "id": "JVNDB-2018-010806" }, { "db": "CNNVD", "id": "CNNVD-201809-968" }, { "db": "NVD", "id": "CVE-2018-11277" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-09-20T00:00:00", "db": "VULHUB", "id": "VHN-121120" }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010806" }, { "date": "2018-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-968" }, { "date": "2018-09-20T13:29:01.167000", "db": "NVD", "id": "CVE-2018-11277" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-121120" }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010806" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-968" }, { "date": "2024-11-21T03:43:02.667000", "db": "NVD", "id": "CVE-2018-11277" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-968" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Snapdragon Vulnerabilities related to authorization, authority, and access control in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010806" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-968" } ], "trust": 0.6 } }
var-201809-0859
Vulnerability from variot
In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20, Snapdragon_High_Med_2016, while parsing FLAC file with corrupted picture block, a buffer over-read can occur. Snapdragon (Automobile , Mobile , Wear) Contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-68326803, A-62213176, A-73539234, A-72950814, A-77484228, A-111090697, A-68326811, A-78240387, A-78239234, A-68326819, A-71501117, A-72950958, A-74236425, A-77484229, A-79419793, A-109677940, A-109677982, A-109677964, A-109678202, A-109678380, A-111091377, A-111090533, A-111093202, A-111090698, A-111093021, and A-111093167. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. A buffer out-of-bounds read exists in several Qualcomm Snapdragon products. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201809-0859", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sda660", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm710", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm636", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm660", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm632", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm429", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd845", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm439", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdx20", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm630", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd810", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd435", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd616", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd205", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd820a", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd427", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd820", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd415", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd210", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd625", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd450", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd425", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd615", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd212", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd430", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd835", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8909w", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 205", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 210", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 212", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 415", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 425", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 427", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 430", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 435", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 450", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 615", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 616", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 625", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 810", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 820", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 820a", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 835", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 845", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sda 660", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 429", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 439", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 630", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 632", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 636", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 660", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm710", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdx20", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "pixel xl", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "pixel c", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "pixel", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "nexus player", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9" }, { "model": "nexus 6p", "scope": null, "trust": 0.3, "vendor": "google", "version": null }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5x" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" } ], "sources": [ { "db": "BID", "id": "106494" }, { "db": "JVNDB", "id": "JVNDB-2018-010807" }, { "db": "CNNVD", "id": "CNNVD-201809-967" }, { "db": "NVD", "id": "CVE-2018-11285" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8909w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_205_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_212_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_415_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_425_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_427_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_430_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_435_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_450_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_615_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_616_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_625_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_810_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_820_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_820a_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_835_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_845_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sda_660_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_429_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_439_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_630_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_632_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_636_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_660_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_710_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdx20_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010807" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported these issues.", "sources": [ { "db": "BID", "id": "106494" } ], "trust": 0.3 }, "cve": "CVE-2018-11285", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2018-11285", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-121129", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-11285", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-11285", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2018-11285", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201809-967", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-121129", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2018-11285", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-121129" }, { "db": "VULMON", "id": "CVE-2018-11285" }, { "db": "JVNDB", "id": "JVNDB-2018-010807" }, { "db": "CNNVD", "id": "CNNVD-201809-967" }, { "db": "NVD", "id": "CVE-2018-11285" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9650, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, SDX20, Snapdragon_High_Med_2016, while parsing FLAC file with corrupted picture block, a buffer over-read can occur. Snapdragon (Automobile , Mobile , Wear) Contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. \nAn attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. \nThese issues are being tracked by Android Bug IDs A-68326803, A-62213176, A-73539234, A-72950814, A-77484228, A-111090697, A-68326811, A-78240387, A-78239234, A-68326819, A-71501117, A-72950958, A-74236425, A-77484229, A-79419793, A-109677940, A-109677982, A-109677964, A-109678202, A-109678380, A-111091377, A-111090533, A-111093202, A-111090698, A-111093021, and A-111093167. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. A buffer out-of-bounds read exists in several Qualcomm Snapdragon products. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements", "sources": [ { "db": "NVD", "id": "CVE-2018-11285" }, { "db": "JVNDB", "id": "JVNDB-2018-010807" }, { "db": "BID", "id": "106494" }, { "db": "VULHUB", "id": "VHN-121129" }, { "db": "VULMON", "id": "CVE-2018-11285" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-11285", "trust": 2.9 }, { "db": "JVNDB", "id": "JVNDB-2018-010807", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201809-967", "trust": 0.7 }, { "db": "BID", "id": "106494", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-121129", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-11285", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-121129" }, { "db": "VULMON", "id": "CVE-2018-11285" }, { "db": "BID", "id": "106494" }, { "db": "JVNDB", "id": "JVNDB-2018-010807" }, { "db": "CNNVD", "id": "CNNVD-201809-967" }, { "db": "NVD", "id": "CVE-2018-11285" } ] }, "id": "VAR-201809-0859", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-121129" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:52:41.846000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "September 2018 Qualcomm Technologies, Inc. Security Bulletin", "trust": 0.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "title": "Multiple Qualcomm Snapdragon Product Buffer Error Vulnerability Fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85080" }, { "title": "Android Security Bulletins: Android Security Bulletin\u2014September 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=25cebb27b25b2e242f56769472d26cc5" }, { "title": "SamsungReleaseNotes", "trust": 0.1, "url": "https://github.com/samreleasenotes/SamsungReleaseNotes " } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-11285" }, { "db": "JVNDB", "id": "JVNDB-2018-010807" }, { "db": "CNNVD", "id": "CNNVD-201809-967" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-121129" }, { "db": "JVNDB", "id": "JVNDB-2018-010807" }, { "db": "NVD", "id": "CVE-2018-11285" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components" }, { "trust": 1.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-11285" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-11285" }, { "trust": 0.4, "url": "https://source.android.com/security/bulletin/2018-09-01.html" }, { "trust": 0.3, "url": "http://code.google.com/android/" }, { "trust": 0.3, "url": "http://www.qualcomm.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/125.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/samreleasenotes/samsungreleasenotes" } ], "sources": [ { "db": "VULHUB", "id": "VHN-121129" }, { "db": "VULMON", "id": "CVE-2018-11285" }, { "db": "BID", "id": "106494" }, { "db": "JVNDB", "id": "JVNDB-2018-010807" }, { "db": "CNNVD", "id": "CNNVD-201809-967" }, { "db": "NVD", "id": "CVE-2018-11285" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-121129" }, { "db": "VULMON", "id": "CVE-2018-11285" }, { "db": "BID", "id": "106494" }, { "db": "JVNDB", "id": "JVNDB-2018-010807" }, { "db": "CNNVD", "id": "CNNVD-201809-967" }, { "db": "NVD", "id": "CVE-2018-11285" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-09-20T00:00:00", "db": "VULHUB", "id": "VHN-121129" }, { "date": "2018-09-20T00:00:00", "db": "VULMON", "id": "CVE-2018-11285" }, { "date": "2018-09-04T00:00:00", "db": "BID", "id": "106494" }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010807" }, { "date": "2018-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-967" }, { "date": "2018-09-20T13:29:01.260000", "db": "NVD", "id": "CVE-2018-11285" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-11-23T00:00:00", "db": "VULHUB", "id": "VHN-121129" }, { "date": "2018-11-23T00:00:00", "db": "VULMON", "id": "CVE-2018-11285" }, { "date": "2018-09-04T00:00:00", "db": "BID", "id": "106494" }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010807" }, { "date": "2018-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-967" }, { "date": "2024-11-21T03:43:03.447000", "db": "NVD", "id": "CVE-2018-11285" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-967" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Snapdragon Product out-of-bounds vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010807" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-967" } ], "trust": 0.6 } }