Vulnerability Name: | CVE-2018-11953 (CCN-163277) |
Assigned: | 2018-06-07 |
Published: | 2019-04-01 |
Updated: | 2019-05-29 |
Summary: | While processing ssid IE length from remote AP, possible out-of-bounds access may occur due to crafted ssid IE length in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 650/52, SD 820, SD 820A, SDM439, SDX20
|
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High | 7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) 6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): None Availibility (A): None |
|
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:N/A:N)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): None Availibility (A): None |
|
Vulnerability Type: | CWE-125
|
Vulnerability Consequences: | Obtain Information |
References: | Source: MITRE Type: CNA CVE-2018-11953
Source: XF Type: UNKNOWN codeaurora-cve201811953-info-disc(163277)
Source: CCN Type: Code Aurora Security Bulletin April 2019 Code Aurora
Source: CONFIRM Type: Patch, Third Party Advisory https://www.codeaurora.org/security-bulletin/2019/04/01/april-2019-code-aurora-security-bulletin
|
Vulnerable Configuration: | Configuration 1: cpe:/o:qualcomm:mdm9150_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:mdm9150:-:*:*:*:*:*:*:* Configuration 2: cpe:/o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:mdm9206:-:*:*:*:*:*:*:* Configuration 3: cpe:/o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:mdm9607:-:*:*:*:*:*:*:* Configuration 4: cpe:/o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:mdm9640:-:*:*:*:*:*:*:* Configuration 5: cpe:/o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:mdm9650:-:*:*:*:*:*:*:* Configuration 6: cpe:/o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:msm8909w:-:*:*:*:*:*:*:* Configuration 7: cpe:/o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:msm8996au:-:*:*:*:*:*:*:* Configuration 8: cpe:/o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:qca6174a:-:*:*:*:*:*:*:* Configuration 9: cpe:/o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:qca6574au:-:*:*:*:*:*:*:* Configuration 10: cpe:/o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:qca9377:-:*:*:*:*:*:*:* Configuration 11: cpe:/o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:qca9379:-:*:*:*:*:*:*:* Configuration 12: cpe:/o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:qm215:-:*:*:*:*:*:*:* Configuration 13: cpe:/o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_210:-:*:*:*:*:*:*:* Configuration 14: cpe:/o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_212:-:*:*:*:*:*:*:* Configuration 15: cpe:/o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_205:-:*:*:*:*:*:*:* Configuration 16: cpe:/o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_425:-:*:*:*:*:*:*:* Configuration 17: cpe:/o:qualcomm:sd_439_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_439:-:*:*:*:*:*:*:* Configuration 18: cpe:/o:qualcomm:sd_429_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_429:-:*:*:*:*:*:*:* Configuration 19: cpe:/o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_450:-:*:*:*:*:*:*:* Configuration 20: cpe:/o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_615:-:*:*:*:*:*:*:* Configuration 21: cpe:/o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_616:-:*:*:*:*:*:*:* Configuration 22: cpe:/o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_415:-:*:*:*:*:*:*:* Configuration 23: cpe:/o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_625:-:*:*:*:*:*:*:* Configuration 24: cpe:/o:qualcomm:sd_632_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_632:-:*:*:*:*:*:*:* Configuration 25: cpe:/o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_650:-:*:*:*:*:*:*:* Configuration 26: cpe:/o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_652:-:*:*:*:*:*:*:* Configuration 27: cpe:/o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_820:-:*:*:*:*:*:*:* Configuration 28: cpe:/o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sd_820a:-:*:*:*:*:*:*:* Configuration 29: cpe:/o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm439:-:*:*:*:*:*:*:* Configuration 30: cpe:/o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdx20:-:*:*:*:*:*:*:* Configuration CCN 1: cpe:/o:codeaurora:android-msm:2.6.29:*:*:*:*:*:*:*OR cpe:/h:qualcomm:snapdragon_mobile:-:*:*:*:*:*:*:*OR cpe:/h:qualcomm:snapdragon_auto:-:*:*:*:*:*:*:*OR cpe:/h:qualcomm:snapdragon_voice_&_music:-:*:*:*:*:*:*:* Denotes that component is vulnerable |
BACK |
qualcomm mdm9150 firmware -
qualcomm mdm9150 -
qualcomm mdm9206 firmware -
qualcomm mdm9206 -
qualcomm mdm9607 firmware -
qualcomm mdm9607 -
qualcomm mdm9640 firmware -
qualcomm mdm9640 -
qualcomm mdm9650 firmware -
qualcomm mdm9650 -
qualcomm msm8909w firmware -
qualcomm msm8909w -
qualcomm msm8996au firmware -
qualcomm msm8996au -
qualcomm qca6174a firmware -
qualcomm qca6174a -
qualcomm qca6574au firmware -
qualcomm qca6574au -
qualcomm qca9377 firmware -
qualcomm qca9377 -
qualcomm qca9379 firmware -
qualcomm qca9379 -
qualcomm qm215 firmware -
qualcomm qm215 -
qualcomm sd 210 firmware -
qualcomm sd 210 -
qualcomm sd 212 firmware -
qualcomm sd 212 -
qualcomm sd 205 firmware -
qualcomm sd 205 -
qualcomm sd 425 firmware -
qualcomm sd 425 -
qualcomm sd 439 firmware -
qualcomm sd 439 -
qualcomm sd 429 firmware -
qualcomm sd 429 -
qualcomm sd 450 firmware -
qualcomm sd 450 -
qualcomm sd 615 firmware -
qualcomm sd 615 -
qualcomm sd 616 firmware -
qualcomm sd 616 -
qualcomm sd 415 firmware -
qualcomm sd 415 -
qualcomm sd 625 firmware -
qualcomm sd 625 -
qualcomm sd 632 firmware -
qualcomm sd 632 -
qualcomm sd 650 firmware -
qualcomm sd 650 -
qualcomm sd 652 firmware -
qualcomm sd 652 -
qualcomm sd 820 firmware -
qualcomm sd 820 -
qualcomm sd 820a firmware -
qualcomm sd 820a -
qualcomm sdm439 firmware -
qualcomm sdm439 -
qualcomm sdx20 firmware -
qualcomm sdx20 -
codeaurora android-msm 2.6.29
qualcomm snapdragon mobile -
qualcomm snapdragon auto -
qualcomm snapdragon voice & music -