Vulnerability Name: | CVE-2019-14024 (CCN-174874) |
Assigned: | 2019-07-19 |
Published: | 2019-07-19 |
Updated: | 2020-01-24 |
Summary: | Possible stack-use-after-scope issue in NFC usecase for card emulation in Snapdragon Auto, Snapdragon Industrial IOT, Snapdragon Mobile in MSM8917, MSM8953, Nicobar, QM215, Rennell, SDM429, SDM439, SDM450, SDM632, SDM670, SDM710, SDM845, SM6150, SM7150, SM8150, SM8250, SXR2130
|
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): Low User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High | 8.4 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 7.3 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High |
|
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete |
|
Vulnerability Type: | CWE-416
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2019-14024
Source: XF Type: UNKNOWN qualcomm-cve201914024-code-exec(174874)
Source: CCN Type: Qualcomm Web site January 2020 Security Bulletin
Source: CONFIRM Type: Patch, Vendor Advisory https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin
|
Vulnerable Configuration: | Configuration 1: cpe:/o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:msm8917:-:*:*:*:*:*:*:* Configuration 2: cpe:/o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:msm8953:-:*:*:*:*:*:*:* Configuration 3: cpe:/o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:nicobar:-:*:*:*:*:*:*:* Configuration 4: cpe:/o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:qm215:-:*:*:*:*:*:*:* Configuration 5: cpe:/o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:rennell:-:*:*:*:*:*:*:* Configuration 6: cpe:/o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm429:-:*:*:*:*:*:*:* Configuration 7: cpe:/o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm439:-:*:*:*:*:*:*:* Configuration 8: cpe:/o:qualcomm:sdm450_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm450:-:*:*:*:*:*:*:* Configuration 9: cpe:/o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm632:-:*:*:*:*:*:*:* Configuration 10: cpe:/o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm670:-:*:*:*:*:*:*:* Configuration 11: cpe:/o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm710:-:*:*:*:*:*:*:* Configuration 12: cpe:/o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sdm845:-:*:*:*:*:*:*:* Configuration 13: cpe:/o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sm6150:-:*:*:*:*:*:*:* Configuration 14: cpe:/o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sm7150:-:*:*:*:*:*:*:* Configuration 15: cpe:/o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sm8150:-:*:*:*:*:*:*:* Configuration 16: cpe:/o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sm8250:-:*:*:*:*:*:*:* Configuration 17: cpe:/o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*AND cpe:/h:qualcomm:sxr2130:-:*:*:*:*:*:*:* Configuration CCN 1: cpe:/h:qualcomm:snapdragon_mobile:-:*:*:*:*:*:*:*OR cpe:/h:qualcomm:snapdragon_auto:-:*:*:*:*:*:*:*OR cpe:/h:qualcomm:snapdragon_industrial_internet_of_things:-:*:*:*:*:*:*:* Denotes that component is vulnerable |
BACK |
qualcomm msm8917 firmware -
qualcomm msm8917 -
qualcomm msm8953 firmware -
qualcomm msm8953 -
qualcomm nicobar firmware -
qualcomm nicobar -
qualcomm qm215 firmware -
qualcomm qm215 -
qualcomm rennell firmware -
qualcomm rennell -
qualcomm sdm429 firmware -
qualcomm sdm429 -
qualcomm sdm439 firmware -
qualcomm sdm439 -
qualcomm sdm450 firmware -
qualcomm sdm450 -
qualcomm sdm632 firmware -
qualcomm sdm632 -
qualcomm sdm670 firmware -
qualcomm sdm670 -
qualcomm sdm710 firmware -
qualcomm sdm710 -
qualcomm sdm845 firmware -
qualcomm sdm845 -
qualcomm sm6150 firmware -
qualcomm sm6150 -
qualcomm sm7150 firmware -
qualcomm sm7150 -
qualcomm sm8150 firmware -
qualcomm sm8150 -
qualcomm sm8250 firmware -
qualcomm sm8250 -
qualcomm sxr2130 firmware -
qualcomm sxr2130 -
qualcomm snapdragon mobile -
qualcomm snapdragon auto -
qualcomm snapdragon industrial internet of things -