Vulnerability Name: | CVE-2017-18292 (CCN-151933) |
Assigned: | 2018-08-06 |
Published: | 2018-08-06 |
Updated: | 2018-12-10 |
Summary: | Secure app running in non secure space can restart TZ by calling Widevine app API repeatedly in Snapdragon Automobile, Snapdragon Mobile and Snapdragon Wear in versions MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 810, SD 820, SD 820A.
|
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): Low User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): High | 7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): High |
|
CVSS v2 Severity: | 4.9 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Complete | 7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Complete |
|
Vulnerability Type: | CWE-20
|
Vulnerability Consequences: | Denial of Service |
References: | Source: MITRE Type: CNA CVE-2017-18292
Source: SECTRACK Type: Third Party Advisory, VDB Entry 1041432
Source: CCN Type: Google Web site Android
Source: XF Type: UNKNOWN android-cve201718292-dos(151933)
Source: CCN Type: Android Open Source Project Android Security Bulletin—August 2018
Source: CONFIRM Type: Third Party Advisory https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components
Source: CONFIRM Type: Vendor Advisory https://www.qualcomm.com/company/product-security/bulletins
|
Vulnerable Configuration: | Configuration 1: cpe:/o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:msm8909w:-:*:*:*:*:*:*:* Configuration 2: cpe:/o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:msm8996au:-:*:*:*:*:*:*:* Configuration 3: cpe:/o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_210:-:*:*:*:*:*:*:* Configuration 4: cpe:/o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_212:-:*:*:*:*:*:*:* Configuration 5: cpe:/o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_205:-:*:*:*:*:*:*:* Configuration 6: cpe:/o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_410:-:*:*:*:*:*:*:* Configuration 7: cpe:/o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_412:-:*:*:*:*:*:*:* Configuration 8: cpe:/o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_425:-:*:*:*:*:*:*:* Configuration 9: cpe:/o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_430:-:*:*:*:*:*:*:* Configuration 10: cpe:/o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_450:-:*:*:*:*:*:*:* Configuration 11: cpe:/o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_615:-:*:*:*:*:*:*:* Configuration 12: cpe:/o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_616:-:*:*:*:*:*:*:* Configuration 13: cpe:/o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_415:-:*:*:*:*:*:*:* Configuration 14: cpe:/o:qualcomm:sd_617_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_617:-:*:*:*:*:*:*:* Configuration 15: cpe:/o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_625:-:*:*:*:*:*:*:* Configuration 16: cpe:/o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_650:-:*:*:*:*:*:*:* Configuration 17: cpe:/o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_652:-:*:*:*:*:*:*:* Configuration 18: cpe:/o:qualcomm:sd_800_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_800:-:*:*:*:*:*:*:* Configuration 19: cpe:/o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_810:-:*:*:*:*:*:*:* Configuration 20: cpe:/o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_820:-:*:*:*:*:*:*:* Configuration 21: cpe:/o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_820a:-:*:*:*:*:*:*:* Configuration CCN 1: cpe:/o:google:android:*:*:*:*:*:*:*:* Denotes that component is vulnerable |
BACK |
qualcomm msm8909w firmware -
qualcomm msm8909w -
qualcomm msm8996au firmware -
qualcomm msm8996au -
qualcomm sd 210 firmware -
qualcomm sd 210 -
qualcomm sd 212 firmware -
qualcomm sd 212 -
qualcomm sd 205 firmware -
qualcomm sd 205 -
qualcomm sd 410 firmware -
qualcomm sd 410 -
qualcomm sd 412 firmware -
qualcomm sd 412 -
qualcomm sd 425 firmware -
qualcomm sd 425 -
qualcomm sd 430 firmware -
qualcomm sd 430 -
qualcomm sd 450 firmware -
qualcomm sd 450 -
qualcomm sd 615 firmware -
qualcomm sd 615 -
qualcomm sd 616 firmware -
qualcomm sd 616 -
qualcomm sd 415 firmware -
qualcomm sd 415 -
qualcomm sd 617 firmware -
qualcomm sd 617 -
qualcomm sd 625 firmware -
qualcomm sd 625 -
qualcomm sd 650 firmware -
qualcomm sd 650 -
qualcomm sd 652 firmware -
qualcomm sd 652 -
qualcomm sd 800 firmware -
qualcomm sd 800 -
qualcomm sd 810 firmware -
qualcomm sd 810 -
qualcomm sd 820 firmware -
qualcomm sd 820 -
qualcomm sd 820a firmware -
qualcomm sd 820a -
google android *