ID

VAR-201810-0043


CVE

CVE-2017-18310


TITLE

plural Snapdragon Access control vulnerabilities in products

Trust: 0.8

sources: JVNDB: JVNDB-2017-014327

DESCRIPTION

ClientEnv exposes services 0-32 to HLOS in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in version MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, Snapdragon_High_Med_2016. Snapdragon Automobile , Snapdragon Mobile , Snapdragon Wear Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MSM8909W, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) for different platforms. An access control error vulnerability exists in TZ in several Qualcomm Snapdragon products. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements

Trust: 1.8

sources: NVD: CVE-2017-18310 // JVNDB: JVNDB-2017-014327 // VULHUB: VHN-109420 // VULMON: CVE-2017-18310

AFFECTED PRODUCTS

vendor:qualcommmodel:sda660scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sdm636scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sdm660scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sdm632scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 835scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 820ascope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 845scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sdm429scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sdm439scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sdm630scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:msm8996auscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 415scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 205scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 427scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 212scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 617scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 652scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 425scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 615scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 810scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 820scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 450scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 616scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:msm8909wscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 435scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 412scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 430scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 210scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 410scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 625scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:msm8909wscope: - version: -

Trust: 0.8

vendor:qualcommmodel:msm8996auscope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 205scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 210scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 212scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 410scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 412scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 415scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 425scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 427scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 430scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 435scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 450scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 615scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 616scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 617scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 625scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 652scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 810scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 820scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 820ascope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 835scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 845scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sda660scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sdm429scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sdm439scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sdm630scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sdm632scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sdm636scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sdm660scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2017-014327 // CNNVD: CNNVD-201810-1281 // NVD: CVE-2017-18310

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-18310
value: HIGH

Trust: 1.0

NVD: CVE-2017-18310
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201810-1281
value: HIGH

Trust: 0.6

VULHUB: VHN-109420
value: HIGH

Trust: 0.1

VULMON: CVE-2017-18310
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-18310
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-109420
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-18310
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-109420 // VULMON: CVE-2017-18310 // JVNDB: JVNDB-2017-014327 // CNNVD: CNNVD-201810-1281 // NVD: CVE-2017-18310

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-284

Trust: 0.9

sources: VULHUB: VHN-109420 // JVNDB: JVNDB-2017-014327 // NVD: CVE-2017-18310

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201810-1281

TYPE

access control error

Trust: 0.6

sources: CNNVD: CNNVD-201810-1281

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-014327

PATCH

title:October 2018 Qualcomm Technologies, Inc. Security Bulletinurl:https://www.qualcomm.com/company/product-security/bulletins

Trust: 0.8

title:Multiple Qualcomm Snapdragon Product access control error vulnerability fixesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86353

Trust: 0.6

title:Android Security Bulletins: Android Security Bulletin—August 2018url:https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins&qid=746dc14fcd3f5e139648cfdc9d9039a9

Trust: 0.1

title:SamsungReleaseNotesurl:https://github.com/samreleasenotes/SamsungReleaseNotes

Trust: 0.1

sources: VULMON: CVE-2017-18310 // JVNDB: JVNDB-2017-014327 // CNNVD: CNNVD-201810-1281

EXTERNAL IDS

db:NVDid:CVE-2017-18310

Trust: 2.6

db:SECTRACKid:1041432

Trust: 1.8

db:JVNDBid:JVNDB-2017-014327

Trust: 0.8

db:CNNVDid:CNNVD-201810-1281

Trust: 0.7

db:VULHUBid:VHN-109420

Trust: 0.1

db:VULMONid:CVE-2017-18310

Trust: 0.1

sources: VULHUB: VHN-109420 // VULMON: CVE-2017-18310 // JVNDB: JVNDB-2017-014327 // CNNVD: CNNVD-201810-1281 // NVD: CVE-2017-18310

REFERENCES

url:https://www.qualcomm.com/company/product-security/bulletins

Trust: 1.8

url:http://www.securitytracker.com/id/1041432

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-18310

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-18310

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://source.android.com/security/bulletin/2018-08-01.html

Trust: 0.1

url:https://github.com/samreleasenotes/samsungreleasenotes

Trust: 0.1

sources: VULHUB: VHN-109420 // VULMON: CVE-2017-18310 // JVNDB: JVNDB-2017-014327 // CNNVD: CNNVD-201810-1281 // NVD: CVE-2017-18310

SOURCES

db:VULHUBid:VHN-109420
db:VULMONid:CVE-2017-18310
db:JVNDBid:JVNDB-2017-014327
db:CNNVDid:CNNVD-201810-1281
db:NVDid:CVE-2017-18310

LAST UPDATE DATE

2024-11-23T21:24:43.685000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-109420date:2019-10-03T00:00:00
db:VULMONid:CVE-2017-18310date:2019-10-03T00:00:00
db:JVNDBid:JVNDB-2017-014327date:2019-02-01T00:00:00
db:CNNVDid:CNNVD-201810-1281date:2019-10-23T00:00:00
db:NVDid:CVE-2017-18310date:2024-11-21T03:19:49.567

SOURCES RELEASE DATE

db:VULHUBid:VHN-109420date:2018-10-26T00:00:00
db:VULMONid:CVE-2017-18310date:2018-10-26T00:00:00
db:JVNDBid:JVNDB-2017-014327date:2019-02-01T00:00:00
db:CNNVDid:CNNVD-201810-1281date:2018-10-29T00:00:00
db:NVDid:CVE-2017-18310date:2018-10-26T13:29:00.543