Vulnerability Name:

CVE-2017-15841 (CCN-163385)

Assigned:2017-10-24
Published:2017-10-24
Updated:2019-10-03
Summary:When HOST sends a Special command ID packet, Controller triggers a RAM Dump and FW reset in Snapdragon Mobile in version SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820, SD 835, Snapdragon_High_Med_2016.
CVSS v3 Severity:5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
6.8 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N)
5.9 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): High
Availibility (A): None
CVSS v2 Severity:4.9 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
5.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:C/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Complete
Availibility (A): None
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2017-15841

Source: XF
Type: UNKNOWN
qualcomm-cve201715841-sec-bypass(163385)

Source: CCN
Type: Qualcomm Web site
Security Bulletins

Source: CONFIRM
Type: Vendor Advisory
https://www.qualcomm.com/company/product-security/bulletins

Vulnerable Configuration:Configuration 1:
  • cpe:/o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_410:-:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_412:-:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_425:-:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_427:-:*:*:*:*:*:*:*

  • Configuration 5:
  • cpe:/o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_430:-:*:*:*:*:*:*:*

  • Configuration 6:
  • cpe:/o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_435:-:*:*:*:*:*:*:*

  • Configuration 7:
  • cpe:/o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_450:-:*:*:*:*:*:*:*

  • Configuration 8:
  • cpe:/o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_615:-:*:*:*:*:*:*:*

  • Configuration 9:
  • cpe:/o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_616:-:*:*:*:*:*:*:*

  • Configuration 10:
  • cpe:/o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_415:-:*:*:*:*:*:*:*

  • Configuration 11:
  • cpe:/o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_625:-:*:*:*:*:*:*:*

  • Configuration 12:
  • cpe:/o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_650:-:*:*:*:*:*:*:*

  • Configuration 13:
  • cpe:/o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_652:-:*:*:*:*:*:*:*

  • Configuration 14:
  • cpe:/o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_820:-:*:*:*:*:*:*:*

  • Configuration 15:
  • cpe:/o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:sd_835:-:*:*:*:*:*:*:*

  • Configuration 16:
  • cpe:/o:qualcomm:snapdragon_high_med_2016_firmware:-:*:*:*:*:*:*:*
  • AND
  • cpe:/h:qualcomm:snapdragon_high_med_2016:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/h:qualcomm:snapdragon_mobile:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    qualcomm sd 410 firmware -
    qualcomm sd 410 -
    qualcomm sd 412 firmware -
    qualcomm sd 412 -
    qualcomm sd 425 firmware -
    qualcomm sd 425 -
    qualcomm sd 427 firmware -
    qualcomm sd 427 -
    qualcomm sd 430 firmware -
    qualcomm sd 430 -
    qualcomm sd 435 firmware -
    qualcomm sd 435 -
    qualcomm sd 450 firmware -
    qualcomm sd 450 -
    qualcomm sd 615 firmware -
    qualcomm sd 615 -
    qualcomm sd 616 firmware -
    qualcomm sd 616 -
    qualcomm sd 415 firmware -
    qualcomm sd 415 -
    qualcomm sd 625 firmware -
    qualcomm sd 625 -
    qualcomm sd 650 firmware -
    qualcomm sd 650 -
    qualcomm sd 652 firmware -
    qualcomm sd 652 -
    qualcomm sd 820 firmware -
    qualcomm sd 820 -
    qualcomm sd 835 firmware -
    qualcomm sd 835 -
    qualcomm snapdragon high med 2016 firmware -
    qualcomm snapdragon high med 2016 -
    qualcomm snapdragon mobile -