ID

VAR-201809-0862


CVE

CVE-2018-11290


TITLE

plural Snapdragon Product Cryptographic vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-013510

DESCRIPTION

In Snapdragon (Automobile, Mobile, Wear) in version MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, QCA6584, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 650/52, SD 820A, SD 845, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDX20, Snapdragon_High_Med_2016, MAC address randomization performed during probe requests is not done properly due to a flawed RNG in use. Snapdragon (Automobile , Mobile , Wear) Contains a cryptographic vulnerability.Information may be tampered with. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-68326803, A-62213176, A-73539234, A-72950814, A-77484228, A-111090697, A-68326811, A-78240387, A-78239234, A-68326819, A-71501117, A-72950958, A-74236425, A-77484229, A-79419793, A-109677940, A-109677982, A-109677964, A-109678202, A-109678380, A-111091377, A-111090533, A-111093202, A-111090698, A-111093021, and A-111093167. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. A cryptographic vulnerability exists in several Qualcomm Snapdragon products due to the program's use of a flawed random number generator. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements

Trust: 2.07

sources: NVD: CVE-2018-11290 // JVNDB: JVNDB-2018-013510 // BID: 106494 // VULHUB: VHN-121135 // VULMON: CVE-2018-11290

AFFECTED PRODUCTS

vendor:qualcommmodel:sdm636scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sdm660scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sdm632scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:qca6584scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd820ascope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sdm429scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd845scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sdm439scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sdx20scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sdm630scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:msm8996auscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd435scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd205scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9607scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qca6574auscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd427scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd652scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9640scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd625scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd210scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd450scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd425scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd212scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd430scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9607scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9640scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:msm8996auscope: - version: -

Trust: 0.8

vendor:qualcommmodel:qca6574auscope: - version: -

Trust: 0.8

vendor:qualcommmodel:qca6584scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 205scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 210scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 212scope: - version: -

Trust: 0.8

vendor:googlemodel:pixel xlscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixel cscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixelscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexus playerscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:9

Trust: 0.3

vendor:googlemodel:nexus 6pscope: - version: -

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:6

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5x

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:0

Trust: 0.3

sources: BID: 106494 // JVNDB: JVNDB-2018-013510 // CNNVD: CNNVD-201809-965 // NVD: CVE-2018-11290

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-11290
value: HIGH

Trust: 1.0

NVD: CVE-2018-11290
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201809-965
value: HIGH

Trust: 0.6

VULHUB: VHN-121135
value: MEDIUM

Trust: 0.1

VULMON: CVE-2018-11290
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-11290
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-121135
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-11290
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-121135 // VULMON: CVE-2018-11290 // JVNDB: JVNDB-2018-013510 // CNNVD: CNNVD-201809-965 // NVD: CVE-2018-11290

PROBLEMTYPE DATA

problemtype:CWE-338

Trust: 1.1

problemtype:CWE-310

Trust: 0.8

sources: VULHUB: VHN-121135 // JVNDB: JVNDB-2018-013510 // NVD: CVE-2018-11290

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201809-965

TYPE

security feature problem

Trust: 0.6

sources: CNNVD: CNNVD-201809-965

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-013510

PATCH

title:Android のセキュリティに関する公開情報 - 2018 年 9 月url:https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components

Trust: 0.8

title:September 2018 Qualcomm Technologies, Inc. Security Bulletinurl:https://www.qualcomm.com/company/product-security/bulletins

Trust: 0.8

title:Multiple Qualcomm Snapdragon Product encryption problem vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85078

Trust: 0.6

title:Android Security Bulletins: Android Security Bulletin—September 2018url:https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins&qid=25cebb27b25b2e242f56769472d26cc5

Trust: 0.1

title:SamsungReleaseNotesurl:https://github.com/samreleasenotes/SamsungReleaseNotes

Trust: 0.1

sources: VULMON: CVE-2018-11290 // JVNDB: JVNDB-2018-013510 // CNNVD: CNNVD-201809-965

EXTERNAL IDS

db:NVDid:CVE-2018-11290

Trust: 2.9

db:JVNDBid:JVNDB-2018-013510

Trust: 0.8

db:CNNVDid:CNNVD-201809-965

Trust: 0.7

db:BIDid:106494

Trust: 0.3

db:VULHUBid:VHN-121135

Trust: 0.1

db:VULMONid:CVE-2018-11290

Trust: 0.1

sources: VULHUB: VHN-121135 // VULMON: CVE-2018-11290 // BID: 106494 // JVNDB: JVNDB-2018-013510 // CNNVD: CNNVD-201809-965 // NVD: CVE-2018-11290

REFERENCES

url:https://source.android.com/security/bulletin/2018-09-01#qualcomm-closed-source-components

Trust: 1.8

url:https://www.qualcomm.com/company/product-security/bulletins

Trust: 1.8

url:http://support.blackberry.com/kb/articledetail?language=en_us&articlenumber=000051618

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-11290

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-11290

Trust: 0.8

url:https://source.android.com/security/bulletin/2018-09-01.html

Trust: 0.4

url:http://code.google.com/android/

Trust: 0.3

url:http://www.qualcomm.com/

Trust: 0.3

url:http://support.blackberry.com/kb/articledetail?language=en_us&articlenumber=000051618

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/338.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/samreleasenotes/samsungreleasenotes

Trust: 0.1

sources: VULHUB: VHN-121135 // VULMON: CVE-2018-11290 // BID: 106494 // JVNDB: JVNDB-2018-013510 // CNNVD: CNNVD-201809-965 // NVD: CVE-2018-11290

CREDITS

The vendor reported these issues.

Trust: 0.3

sources: BID: 106494

SOURCES

db:VULHUBid:VHN-121135
db:VULMONid:CVE-2018-11290
db:BIDid:106494
db:JVNDBid:JVNDB-2018-013510
db:CNNVDid:CNNVD-201809-965
db:NVDid:CVE-2018-11290

LAST UPDATE DATE

2024-11-23T21:52:41.703000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-121135date:2019-10-03T00:00:00
db:VULMONid:CVE-2018-11290date:2019-10-03T00:00:00
db:BIDid:106494date:2018-09-04T00:00:00
db:JVNDBid:JVNDB-2018-013510date:2019-02-22T00:00:00
db:CNNVDid:CNNVD-201809-965date:2019-10-23T00:00:00
db:NVDid:CVE-2018-11290date:2024-11-21T03:43:04.467

SOURCES RELEASE DATE

db:VULHUBid:VHN-121135date:2018-09-20T00:00:00
db:VULMONid:CVE-2018-11290date:2018-09-20T00:00:00
db:BIDid:106494date:2018-09-04T00:00:00
db:JVNDBid:JVNDB-2018-013510date:2019-02-22T00:00:00
db:CNNVDid:CNNVD-201809-965date:2018-09-21T00:00:00
db:NVDid:CVE-2018-11290date:2018-09-20T13:29:01.543