var-201809-1106
Vulnerability from variot
In Snapdragon (Automobile, Mobile, Wear) in version IPQ8074, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016, MAC address randomization performed during probe requests is not done properly due to a flawed RNG which produced repeating output much earlier than expected. Snapdragon (Automobile , Mobile , Wear) Contains a cryptographic vulnerability.Information may be tampered with. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-78240792, A-78240715, A-78240449, A-78240612, A-78240794, A-78240199, A-78240071, A-78240736, A-78242049, A-78241971, A-78241834, A-78241375, A-68989823, A-72951265, A-74235874, A-74236406, A-77485022, A-77485183, A-77485139, A-77483830, and A-77484449. Qualcomm IPQ8074, etc. are all central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. An encryption issue vulnerability exists in several Qualcomm Snapdragon products due to a program that does not properly randomize MAC addresses. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201809-1106", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sda660", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm710", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm636", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm660", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm632", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd850", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm429", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sd845", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm439", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "sdm630", "scope": "eq", "trust": 1.6, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd435", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd205", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd820a", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "qca6574au", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd427", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "ipq8074", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd625", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd210", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd450", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd425", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd212", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd430", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "sd835", "scope": "eq", "trust": 1.0, "vendor": "qualcomm", "version": null }, { "model": "ipq8074", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9206", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9607", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9640", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "mdm9650", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "msm8996au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "qca6574au", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 205", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 210", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 212", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 425", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 427", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 430", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 435", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 450", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 625", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 820a", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 835", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 845", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sd 850", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sda 660", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 429", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 439", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 630", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 632", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 636", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm 660", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "sdm710", "scope": null, "trust": 0.8, "vendor": "qualcomm", "version": null }, { "model": "pixel xl", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "pixel c", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "pixel", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "nexus player", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9" }, { "model": "nexus 6p", "scope": null, "trust": 0.3, "vendor": "google", "version": null }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5x" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0" } ], "sources": [ { "db": "BID", "id": "104760" }, { "db": "JVNDB", "id": "JVNDB-2018-010801" }, { "db": "CNNVD", "id": "CNNVD-201809-961" }, { "db": "NVD", "id": "CVE-2018-5837" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:qualcomm:ipq8074_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9206_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9607_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9640_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:mdm9650_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:msm8996au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:qca6574au_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_205_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_210_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_212_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_425_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_427_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_430_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_435_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_450_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_625_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_820a_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_835_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_845_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sd_850_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sda_660_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_429_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_439_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_630_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_632_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_636_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_660_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:qualcomm:sdm_710_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010801" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported these issues.", "sources": [ { "db": "BID", "id": "104760" } ], "trust": 0.3 }, "cve": "CVE-2018-5837", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2018-5837", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-135869", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2018-5837", "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-5837", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2018-5837", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201809-961", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-135869", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2018-5837", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-135869" }, { "db": "VULMON", "id": "CVE-2018-5837" }, { "db": "JVNDB", "id": "JVNDB-2018-010801" }, { "db": "CNNVD", "id": "CNNVD-201809-961" }, { "db": "NVD", "id": "CVE-2018-5837" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Snapdragon (Automobile, Mobile, Wear) in version IPQ8074, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016, MAC address randomization performed during probe requests is not done properly due to a flawed RNG which produced repeating output much earlier than expected. Snapdragon (Automobile , Mobile , Wear) Contains a cryptographic vulnerability.Information may be tampered with. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. \nAn attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. \nThese issues are being tracked by Android Bug IDs A-78240792, A-78240715, A-78240449, A-78240612, A-78240794, A-78240199, A-78240071, A-78240736, A-78242049, A-78241971, A-78241834, A-78241375, A-68989823, A-72951265, A-74235874, A-74236406, A-77485022, A-77485183, A-77485139, A-77483830, and A-77484449. Qualcomm IPQ8074, etc. are all central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. An encryption issue vulnerability exists in several Qualcomm Snapdragon products due to a program that does not properly randomize MAC addresses. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements", "sources": [ { "db": "NVD", "id": "CVE-2018-5837" }, { "db": "JVNDB", "id": "JVNDB-2018-010801" }, { "db": "BID", "id": "104760" }, { "db": "VULHUB", "id": "VHN-135869" }, { "db": "VULMON", "id": "CVE-2018-5837" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-5837", "trust": 2.9 }, { "db": "JVNDB", "id": "JVNDB-2018-010801", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201809-961", "trust": 0.7 }, { "db": "BID", "id": "104760", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-135869", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-5837", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-135869" }, { "db": "VULMON", "id": "CVE-2018-5837" }, { "db": "BID", "id": "104760" }, { "db": "JVNDB", "id": "JVNDB-2018-010801" }, { "db": "CNNVD", "id": "CNNVD-201809-961" }, { "db": "NVD", "id": "CVE-2018-5837" } ] }, "id": "VAR-201809-1106", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-135869" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:38:38.103000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Android Security Bulletin-July 2018", "trust": 0.8, "url": "https://source.android.com/security/bulletin/2018-07-01#qualcomm-closed-source-components" }, { "title": "September 2018 Qualcomm Technologies, Inc. Security Bulletin", "trust": 0.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "title": "Multiple Qualcomm Snapdragon Product encryption problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85074" }, { "title": "Android Security Bulletins: Android Security Bulletin\u2014July 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=25584b3d319ca9e7cb2fae9ec5dbf5e0" }, { "title": "SamsungReleaseNotes", "trust": 0.1, "url": "https://github.com/samreleasenotes/SamsungReleaseNotes " } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-5837" }, { "db": "JVNDB", "id": "JVNDB-2018-010801" }, { "db": "CNNVD", "id": "CNNVD-201809-961" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-338", "trust": 1.1 }, { "problemtype": "CWE-310", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-135869" }, { "db": "JVNDB", "id": "JVNDB-2018-010801" }, { "db": "NVD", "id": "CVE-2018-5837" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://source.android.com/security/bulletin/2018-07-01#qualcomm-closed-source-components" }, { "trust": 1.8, "url": "https://www.qualcomm.com/company/product-security/bulletins" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5837" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5837" }, { "trust": 0.3, "url": "http://code.google.com/android/" }, { "trust": 0.3, "url": "http://www.qualcomm.com/" }, { "trust": 0.3, "url": "https://source.android.com/security/bulletin/2018-07-01" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/338.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://source.android.com/security/bulletin/2018-07-01.html" }, { "trust": 0.1, "url": "https://github.com/samreleasenotes/samsungreleasenotes" } ], "sources": [ { "db": "VULHUB", "id": "VHN-135869" }, { "db": "VULMON", "id": "CVE-2018-5837" }, { "db": "BID", "id": "104760" }, { "db": "JVNDB", "id": "JVNDB-2018-010801" }, { "db": "CNNVD", "id": "CNNVD-201809-961" }, { "db": "NVD", "id": "CVE-2018-5837" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-135869" }, { "db": "VULMON", "id": "CVE-2018-5837" }, { "db": "BID", "id": "104760" }, { "db": "JVNDB", "id": "JVNDB-2018-010801" }, { "db": "CNNVD", "id": "CNNVD-201809-961" }, { "db": "NVD", "id": "CVE-2018-5837" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-09-20T00:00:00", "db": "VULHUB", "id": "VHN-135869" }, { "date": "2018-09-20T00:00:00", "db": "VULMON", "id": "CVE-2018-5837" }, { "date": "2018-07-02T00:00:00", "db": "BID", "id": "104760" }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010801" }, { "date": "2018-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-961" }, { "date": "2018-09-20T13:29:02.167000", "db": "NVD", "id": "CVE-2018-5837" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-135869" }, { "date": "2019-10-03T00:00:00", "db": "VULMON", "id": "CVE-2018-5837" }, { "date": "2018-07-02T00:00:00", "db": "BID", "id": "104760" }, { "date": "2018-12-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010801" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-961" }, { "date": "2024-11-21T04:09:30.517000", "db": "NVD", "id": "CVE-2018-5837" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-961" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Qualcomm Snapdragon Cryptographic vulnerabilities in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010801" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "security feature problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-961" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.