ID

VAR-201810-0057


CVE

CVE-2017-18293


TITLE

Snapdragon Mobile and Snapdragon Wear Input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-014301

DESCRIPTION

When a particular GPIO is protected by blocking access to the corresponding GPIO resource registers, the protection can be bypassed using the corresponding banked GPIO registers instead in Snapdragon Mobile, Snapdragon Wear in version MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 835, SDA660. Snapdragon Mobile and Snapdragon Wear Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm MDM9206, etc. are the central processing unit (CPU) products of Qualcomm (Qualcomm) applied to different platforms. TLMM banked GPIO registers is one of the GPIO register components. An access control error vulnerability exists in the TLMM banked GPIO registers in several Qualcomm Snapdragon products. An attacker could exploit this vulnerability to bypass protection mechanisms. The following products (for mobile devices and watches) are affected: Qualcomm MDM9206; MDM9607; MDM9650; SD 210; SD 212; SD 205; SD 425; SD 430; SD 450; SD 625;

Trust: 1.8

sources: NVD: CVE-2017-18293 // JVNDB: JVNDB-2017-014301 // VULHUB: VHN-109401 // VULMON: CVE-2017-18293

AFFECTED PRODUCTS

vendor:qualcommmodel:sd 205scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sda660scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 625scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 430scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 650scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 835scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 425scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:mdm9206scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 652scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 450scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 212scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 210scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9607scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9607scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 205scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 210scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 212scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 425scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 430scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 450scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 625scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 652scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 835scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sda 660scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2017-014301 // CNNVD: CNNVD-201810-1154 // NVD: CVE-2017-18293

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-18293
value: HIGH

Trust: 1.0

NVD: CVE-2017-18293
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201810-1154
value: HIGH

Trust: 0.6

VULHUB: VHN-109401
value: HIGH

Trust: 0.1

VULMON: CVE-2017-18293
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-18293
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-109401
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-18293
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-109401 // VULMON: CVE-2017-18293 // JVNDB: JVNDB-2017-014301 // CNNVD: CNNVD-201810-1154 // NVD: CVE-2017-18293

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-284

Trust: 0.9

sources: VULHUB: VHN-109401 // JVNDB: JVNDB-2017-014301 // NVD: CVE-2017-18293

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201810-1154

TYPE

access control error

Trust: 0.6

sources: CNNVD: CNNVD-201810-1154

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-014301

PATCH

title:October 2018 Qualcomm Technologies, Inc. Security Bulletinurl:https://www.qualcomm.com/company/product-security/bulletins

Trust: 0.8

title:Multiple Qualcomm Snapdragon product TLMM banked GPIO registers Fixes for access control error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86252

Trust: 0.6

title:Android Security Bulletins: Android Security Bulletin—August 2018url:https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins&qid=746dc14fcd3f5e139648cfdc9d9039a9

Trust: 0.1

title:SamsungReleaseNotesurl:https://github.com/samreleasenotes/SamsungReleaseNotes

Trust: 0.1

sources: VULMON: CVE-2017-18293 // JVNDB: JVNDB-2017-014301 // CNNVD: CNNVD-201810-1154

EXTERNAL IDS

db:NVDid:CVE-2017-18293

Trust: 2.6

db:SECTRACKid:1041432

Trust: 1.8

db:JVNDBid:JVNDB-2017-014301

Trust: 0.8

db:CNNVDid:CNNVD-201810-1154

Trust: 0.7

db:VULHUBid:VHN-109401

Trust: 0.1

db:VULMONid:CVE-2017-18293

Trust: 0.1

sources: VULHUB: VHN-109401 // VULMON: CVE-2017-18293 // JVNDB: JVNDB-2017-014301 // CNNVD: CNNVD-201810-1154 // NVD: CVE-2017-18293

REFERENCES

url:https://source.android.com/security/bulletin/2018-08-01#qualcomm-closed-source-components

Trust: 1.8

url:https://www.qualcomm.com/company/product-security/bulletins

Trust: 1.8

url:http://www.securitytracker.com/id/1041432

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-18293

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-18293

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://source.android.com/security/bulletin/2018-08-01.html

Trust: 0.1

url:https://github.com/samreleasenotes/samsungreleasenotes

Trust: 0.1

sources: VULHUB: VHN-109401 // VULMON: CVE-2017-18293 // JVNDB: JVNDB-2017-014301 // CNNVD: CNNVD-201810-1154 // NVD: CVE-2017-18293

SOURCES

db:VULHUBid:VHN-109401
db:VULMONid:CVE-2017-18293
db:JVNDBid:JVNDB-2017-014301
db:CNNVDid:CNNVD-201810-1154
db:NVDid:CVE-2017-18293

LAST UPDATE DATE

2024-11-23T19:24:57.783000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-109401date:2019-10-03T00:00:00
db:VULMONid:CVE-2017-18293date:2019-10-03T00:00:00
db:JVNDBid:JVNDB-2017-014301date:2019-01-11T00:00:00
db:CNNVDid:CNNVD-201810-1154date:2019-10-23T00:00:00
db:NVDid:CVE-2017-18293date:2024-11-21T03:19:47.460

SOURCES RELEASE DATE

db:VULHUBid:VHN-109401date:2018-10-23T00:00:00
db:VULMONid:CVE-2017-18293date:2018-10-23T00:00:00
db:JVNDBid:JVNDB-2017-014301date:2019-01-11T00:00:00
db:CNNVDid:CNNVD-201810-1154date:2018-10-24T00:00:00
db:NVDid:CVE-2017-18293date:2018-10-23T13:29:01.260