Vulnerability Name: CVE-2019-10603 (CCN-177253) Assigned: 2019-03-29 Published: 2019-03-29 Updated: 2020-03-05 Summary: Use after free issue occurs If the real device interface goes down and a route lookup is performed while sending a raw IPv6 message in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8053, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8917, MSM8937, MSM8996AU, QCN7605, SDA845, SDM630, SDM636, SDM660, SDX20, SXR1130 CVSS v3 Severity: 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H )6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): LowUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
9.8 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H )8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-416 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2019-10603 Source: XF Type: UNKNOWNqualcomm-cve201910603-code-exec(177253) Source: CCN Type: Qualcomm Web siteMarch 2020 Security Bulletin Source: CONFIRM Type: Vendor Advisoryhttps://www.qualcomm.com/company/product-security/bulletins/march-2020-bulletin Vulnerable Configuration: Configuration 1 :cpe:/o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:apq8053:-:*:*:*:*:*:*:* Configuration 2 :cpe:/o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:apq8096au:-:*:*:*:*:*:*:* Configuration 3 :cpe:/o:qualcomm:apq8098_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:apq8098:-:*:*:*:*:*:*:* Configuration 4 :cpe:/o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:mdm9206:-:*:*:*:*:*:*:* Configuration 5 :cpe:/o:qualcomm:mdm9207c_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:mdm9207c:-:*:*:*:*:*:*:* Configuration 6 :cpe:/o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:mdm9607:-:*:*:*:*:*:*:* Configuration 7 :cpe:/o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:mdm9640:-:*:*:*:*:*:*:* Configuration 8 :cpe:/o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:mdm9650:-:*:*:*:*:*:*:* Configuration 9 :cpe:/o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:msm8917:-:*:*:*:*:*:*:* Configuration 10 :cpe:/o:qualcomm:msm8937_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:msm8937:-:*:*:*:*:*:*:* Configuration 11 :cpe:/o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:msm8996au:-:*:*:*:*:*:*:* Configuration 12 :cpe:/o:qualcomm:qcn7605_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:qcn7605:-:*:*:*:*:*:*:* Configuration 13 :cpe:/o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sda845:-:*:*:*:*:*:*:* Configuration 14 :cpe:/o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sdm630:-:*:*:*:*:*:*:* Configuration 15 :cpe:/o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sdm636:-:*:*:*:*:*:*:* Configuration 16 :cpe:/o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sdm660:-:*:*:*:*:*:*:* Configuration 17 :cpe:/o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sdx20:-:*:*:*:*:*:*:* Configuration 18 :cpe:/o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:* AND cpe:/h:qualcomm:sxr1130:-:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/h:qualcomm:snapdragon_mobile:-:*:*:*:*:*:*:* OR cpe:/h:qualcomm:snapdragon_auto:-:*:*:*:*:*:*:* OR cpe:/h:qualcomm:snapdragon_compute:-:*:*:*:*:*:*:* OR cpe:/h:qualcomm:snapdragon_consumer_electronics_connectivity:-:*:*:*:*:*:*:* OR cpe:/h:qualcomm:snapdragon_consumer_internet_of_things:-:*:*:*:*:*:*:* OR cpe:/h:qualcomm:snapdragon_industrial_internet_of_things:-:*:*:*:*:*:*:* OR cpe:/h:qualcomm:snapdragon_voice_&_music:-:*:*:*:*:*:*:* OR cpe:/o:qualcomm:snapdragon_wearables:-:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
qualcomm apq8053 firmware -
qualcomm apq8053 -
qualcomm apq8096au firmware -
qualcomm apq8096au -
qualcomm apq8098 firmware -
qualcomm apq8098 -
qualcomm mdm9206 firmware -
qualcomm mdm9206 -
qualcomm mdm9207c firmware -
qualcomm mdm9207c -
qualcomm mdm9607 firmware -
qualcomm mdm9607 -
qualcomm mdm9640 firmware -
qualcomm mdm9640 -
qualcomm mdm9650 firmware -
qualcomm mdm9650 -
qualcomm msm8917 firmware -
qualcomm msm8917 -
qualcomm msm8937 firmware -
qualcomm msm8937 -
qualcomm msm8996au firmware -
qualcomm msm8996au -
qualcomm qcn7605 firmware -
qualcomm qcn7605 -
qualcomm sda845 firmware -
qualcomm sda845 -
qualcomm sdm630 firmware -
qualcomm sdm630 -
qualcomm sdm636 firmware -
qualcomm sdm636 -
qualcomm sdm660 firmware -
qualcomm sdm660 -
qualcomm sdx20 firmware -
qualcomm sdx20 -
qualcomm sxr1130 firmware -
qualcomm sxr1130 -
qualcomm snapdragon mobile -
qualcomm snapdragon auto -
qualcomm snapdragon compute -
qualcomm snapdragon consumer electronics connectivity -
qualcomm snapdragon consumer internet of things -
qualcomm snapdragon industrial internet of things -
qualcomm snapdragon voice & music -
qualcomm snapdragon wearables -