Vulnerability Name: CVE-2018-11855 (CCN-157640) Assigned: 2018-06-07 Published: 2019-02-04 Updated: 2019-02-21 Summary: If an end user makes use of SCP11 sample OCE code without modification it could lead to a buffer overflow when transmitting a CAPDU in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT and Snapdragon Mobile in versions MDM9607, MDM9650, MDM9655, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 636, SD 820, SD 820A, SD 835, SD 8CX, SDA660, SDM630, SDM660. CVSS v3 Severity: 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H )6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): LowUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
8.4 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H )7.3 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-190 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2018-11855 Source: XF Type: UNKNOWNqualcomm-cve201811855-bo(157640) Source: CCN Type: Qualcomm Web siteQualcomm Source: CONFIRM Type: Vendor Advisoryhttps://www.qualcomm.com/company/product-security/bulletins Vulnerable Configuration: Configuration 1 :cpe:/o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:mdm9607:-:*:*:*:*:*:*:* Configuration 2 :cpe:/o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:mdm9650:-:*:*:*:*:*:*:* Configuration 3 :cpe:/o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:mdm9655:-:*:*:*:*:*:*:* Configuration 4 :cpe:/o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:msm8996au:-:*:*:*:*:*:*:* Configuration 5 :cpe:/o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sd_210:-:*:*:*:*:*:*:* Configuration 6 :cpe:/o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sd_212:-:*:*:*:*:*:*:* Configuration 7 :cpe:/o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sd_205:-:*:*:*:*:*:*:* Configuration 8 :cpe:/o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sd_410:-:*:*:*:*:*:*:* Configuration 9 :cpe:/o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sd_412:-:*:*:*:*:*:*:* Configuration 10 :cpe:/o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sd_636:-:*:*:*:*:*:*:* Configuration 11 :cpe:/o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sd_820:-:*:*:*:*:*:*:* Configuration 12 :cpe:/o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sd_820a:-:*:*:*:*:*:*:* Configuration 13 :cpe:/o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sd_835:-:*:*:*:*:*:*:* Configuration 14 :cpe:/o:qualcomm:sd_8cx_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sd_8cx:-:*:*:*:*:*:*:* Configuration 15 :cpe:/o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sda660:-:*:*:*:*:*:*:* Configuration 16 :cpe:/o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sdm630:-:*:*:*:*:*:*:* Configuration 17 :cpe:/o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sdm660:-:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/h:qualcomm:snapdragon_mobile:-:*:*:*:*:*:*:* OR cpe:/h:qualcomm:snapdragon_auto:-:*:*:*:*:*:*:* OR cpe:/h:qualcomm:snapdragon_compute:-:*:*:*:*:*:*:* OR cpe:/h:qualcomm:snapdragon_connectivity:-:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
qualcomm mdm9607 firmware -
qualcomm mdm9607 -
qualcomm mdm9650 firmware -
qualcomm mdm9650 -
qualcomm mdm9655 firmware -
qualcomm mdm9655 -
qualcomm msm8996au firmware -
qualcomm msm8996au -
qualcomm sd 210 firmware -
qualcomm sd 210 -
qualcomm sd 212 firmware -
qualcomm sd 212 -
qualcomm sd 205 firmware -
qualcomm sd 205 -
qualcomm sd 410 firmware -
qualcomm sd 410 -
qualcomm sd 412 firmware -
qualcomm sd 412 -
qualcomm sd 636 firmware -
qualcomm sd 636 -
qualcomm sd 820 firmware -
qualcomm sd 820 -
qualcomm sd 820a firmware -
qualcomm sd 820a -
qualcomm sd 835 firmware -
qualcomm sd 835 -
qualcomm sd 8cx firmware -
qualcomm sd 8cx -
qualcomm sda660 firmware -
qualcomm sda660 -
qualcomm sdm630 firmware -
qualcomm sdm630 -
qualcomm sdm660 firmware -
qualcomm sdm660 -
qualcomm snapdragon mobile -
qualcomm snapdragon auto -
qualcomm snapdragon compute -
qualcomm snapdragon connectivity -