Vulnerability Name: | CVE-2019-14002 (CCN-175942) |
Assigned: | 2019-07-19 |
Published: | 2020-01-06 |
Updated: | 2020-02-10 |
Summary: | APKs without proper permission may bind to CallEnhancementService and can lead to unauthorized access to call status in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8053, APQ8096AU, APQ8098, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, Nicobar, QCA6574AU, QCS605, QM215, SA6155P, SDA660, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM845, SM6150, SM8150, SM8250, SXR2130
|
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): Low User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High | 6.2 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) 5.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): High Availibility (A): None |
|
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 4.9 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:C/A:N)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): Complete Availibility (A): None |
|
Vulnerability Type: | CWE-276
|
Vulnerability Consequences: | Bypass Security |
References: | Source: MITRE Type: CNA CVE-2019-14002
Source: XF Type: UNKNOWN qualcomm-cve201914002-sec-bypass(175942)
Source: CCN Type: Qualcomm Web site January 2020 Security Bulletin
Source: CONFIRM Type: Vendor Advisory https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin
|
Vulnerable Configuration: | Configuration 1: cpe:/o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:apq8053:-:*:*:*:*:*:*:* Configuration 2: cpe:/o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:apq8096au:-:*:*:*:*:*:*:* Configuration 3: cpe:/o:qualcomm:apq8098_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:apq8098:-:*:*:*:*:*:*:* Configuration 4: cpe:/o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:msm8909w:-:*:*:*:*:*:*:* Configuration 5: cpe:/o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:msm8917:-:*:*:*:*:*:*:* Configuration 6: cpe:/o:qualcomm:msm8920_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:msm8920:-:*:*:*:*:*:*:* Configuration 7: cpe:/o:qualcomm:msm8937_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:msm8937:-:*:*:*:*:*:*:* Configuration 8: cpe:/o:qualcomm:msm8940_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:msm8940:-:*:*:*:*:*:*:* Configuration 9: cpe:/o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:msm8953:-:*:*:*:*:*:*:* Configuration 10: cpe:/o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:msm8996au:-:*:*:*:*:*:*:* Configuration 11: cpe:/o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:nicobar:-:*:*:*:*:*:*:* Configuration 12: cpe:/o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:qca6574au:-:*:*:*:*:*:*:* Configuration 13: cpe:/o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:qcs605:-:*:*:*:*:*:*:* Configuration 14: cpe:/o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:qm215:-:*:*:*:*:*:*:* Configuration 15: cpe:/o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sa6155p:-:*:*:*:*:*:*:* Configuration 16: cpe:/o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sda660:-:*:*:*:*:*:*:* Configuration 17: cpe:/o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm429:-:*:*:*:*:*:*:* Configuration 18: cpe:/o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm429w:-:*:*:*:*:*:*:* Configuration 19: cpe:/o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm439:-:*:*:*:*:*:*:* Configuration 20: cpe:/o:qualcomm:sdm450_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm450:-:*:*:*:*:*:*:* Configuration 21: cpe:/o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm630:-:*:*:*:*:*:*:* Configuration 22: cpe:/o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm632:-:*:*:*:*:*:*:* Configuration 23: cpe:/o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm636:-:*:*:*:*:*:*:* Configuration 24: cpe:/o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm660:-:*:*:*:*:*:*:* Configuration 25: cpe:/o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm845:-:*:*:*:*:*:*:* Configuration 26: cpe:/o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sm6150:-:*:*:*:*:*:*:* Configuration 27: cpe:/o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sm8150:-:*:*:*:*:*:*:* Configuration 28: cpe:/o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sm8250:-:*:*:*:*:*:*:* Configuration 29: cpe:/o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sxr2130:-:*:*:*:*:*:*:* Configuration CCN 1: cpe:/h:qualcomm:snapdragon_mobile:-:*:*:*:*:*:*:*OR cpe:/h:qualcomm:snapdragon_auto:-:*:*:*:*:*:*:*OR cpe:/h:qualcomm:snapdragon_compute:-:*:*:*:*:*:*:*OR cpe:/h:qualcomm:snapdragon_consumer_internet_of_things:-:*:*:*:*:*:*:*OR cpe:/h:qualcomm:snapdragon_industrial_internet_of_things:-:*:*:*:*:*:*:*OR cpe:/o:qualcomm:snapdragon_wearables:-:*:*:*:*:*:*:* Denotes that component is vulnerable |
BACK |
qualcomm apq8053 firmware -
qualcomm apq8053 -
qualcomm apq8096au firmware -
qualcomm apq8096au -
qualcomm apq8098 firmware -
qualcomm apq8098 -
qualcomm msm8909w firmware -
qualcomm msm8909w -
qualcomm msm8917 firmware -
qualcomm msm8917 -
qualcomm msm8920 firmware -
qualcomm msm8920 -
qualcomm msm8937 firmware -
qualcomm msm8937 -
qualcomm msm8940 firmware -
qualcomm msm8940 -
qualcomm msm8953 firmware -
qualcomm msm8953 -
qualcomm msm8996au firmware -
qualcomm msm8996au -
qualcomm nicobar firmware -
qualcomm nicobar -
qualcomm qca6574au firmware -
qualcomm qca6574au -
qualcomm qcs605 firmware -
qualcomm qcs605 -
qualcomm qm215 firmware -
qualcomm qm215 -
qualcomm sa6155p firmware -
qualcomm sa6155p -
qualcomm sda660 firmware -
qualcomm sda660 -
qualcomm sdm429 firmware -
qualcomm sdm429 -
qualcomm sdm429w firmware -
qualcomm sdm429w -
qualcomm sdm439 firmware -
qualcomm sdm439 -
qualcomm sdm450 firmware -
qualcomm sdm450 -
qualcomm sdm630 firmware -
qualcomm sdm630 -
qualcomm sdm632 firmware -
qualcomm sdm632 -
qualcomm sdm636 firmware -
qualcomm sdm636 -
qualcomm sdm660 firmware -
qualcomm sdm660 -
qualcomm sdm845 firmware -
qualcomm sdm845 -
qualcomm sm6150 firmware -
qualcomm sm6150 -
qualcomm sm8150 firmware -
qualcomm sm8150 -
qualcomm sm8250 firmware -
qualcomm sm8250 -
qualcomm sxr2130 firmware -
qualcomm sxr2130 -
qualcomm snapdragon mobile -
qualcomm snapdragon auto -
qualcomm snapdragon compute -
qualcomm snapdragon consumer internet of things -
qualcomm snapdragon industrial internet of things -
qualcomm snapdragon wearables -