ID

VAR-201811-0125


CVE

CVE-2018-11921


TITLE

plural Snapdragon Product error handling vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-012581

DESCRIPTION

Failure condition is not handled properly and the correct error code is not returned. It could cause unintended SUI behavior and create unintended SUI display in Snapdragon Automobile, Snapdragon Mobile and Snapdragon Wear in versions MDM9206, MDM9607, MDM9650, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 800, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDA845, SDX24, SXR1130. Snapdragon Automobile , Snapdragon Mobile , Snapdragon Wear Contains an error handling vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-109678453, A-111089815, A-112279482, A-112278875, A-109678259, A-111088838, A-111092944, A-112278972, A-112279521, A-112279426, A-112279483, A-112279144, A-112279544, and A-119050566. Qualcomm MDM9206 and others are products of Qualcomm (Qualcomm). The Qualcomm MDM9206 is a central processing unit (CPU). SDX24 is a modem. A security vulnerability exists in Content Protection in several Qualcomm Snapdragon products. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements

Trust: 1.98

sources: NVD: CVE-2018-11921 // JVNDB: JVNDB-2018-012581 // BID: 106845 // VULHUB: VHN-121829

AFFECTED PRODUCTS

vendor:qualcommmodel:sda660scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 820scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sda845scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sdx24scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 835scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 820ascope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 845scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sxr1130scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 652scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:sd 850scope:eqversion: -

Trust: 1.6

vendor:qualcommmodel:msm8996auscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 415scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 205scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 212scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 425scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9607scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 615scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 810scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 450scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 616scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 800scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 412scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 430scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 210scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 410scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 625scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9607scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:msm8996auscope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 205scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 210scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 212scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 410scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 412scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 415scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 425scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 430scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 450scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 615scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 616scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 625scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 652scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 800scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 810scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 820scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 820ascope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 835scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 845scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 850scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sda 660scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sda845scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sdx24scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sxr1130scope: - version: -

Trust: 0.8

vendor:googlemodel:pixel xlscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixel cscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixelscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexus playerscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:9

Trust: 0.3

vendor:googlemodel:nexus 6pscope: - version: -

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:6

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5x

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:0

Trust: 0.3

sources: BID: 106845 // JVNDB: JVNDB-2018-012581 // CNNVD: CNNVD-201811-834 // NVD: CVE-2018-11921

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-11921
value: HIGH

Trust: 1.0

NVD: CVE-2018-11921
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201811-834
value: HIGH

Trust: 0.6

VULHUB: VHN-121829
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-11921
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-121829
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-11921
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-121829 // JVNDB: JVNDB-2018-012581 // CNNVD: CNNVD-201811-834 // NVD: CVE-2018-11921

PROBLEMTYPE DATA

problemtype:CWE-755

Trust: 1.1

problemtype:CWE-388

Trust: 0.9

sources: VULHUB: VHN-121829 // JVNDB: JVNDB-2018-012581 // NVD: CVE-2018-11921

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201811-834

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-201811-834

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-012581

PATCH

title:November 2018 Qualcomm Technologies, Inc. Security Bulletinurl:https://www.qualcomm.com/company/product-security/bulletins

Trust: 0.8

title:Multiple Qualcomm Snapdragon Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=87058

Trust: 0.6

sources: JVNDB: JVNDB-2018-012581 // CNNVD: CNNVD-201811-834

EXTERNAL IDS

db:NVDid:CVE-2018-11921

Trust: 2.8

db:BIDid:106845

Trust: 2.0

db:JVNDBid:JVNDB-2018-012581

Trust: 0.8

db:CNNVDid:CNNVD-201811-834

Trust: 0.7

db:VULHUBid:VHN-121829

Trust: 0.1

sources: VULHUB: VHN-121829 // BID: 106845 // JVNDB: JVNDB-2018-012581 // CNNVD: CNNVD-201811-834 // NVD: CVE-2018-11921

REFERENCES

url:http://www.securityfocus.com/bid/106845

Trust: 2.3

url:https://www.qualcomm.com/company/product-security/bulletins

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-11921

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-11921

Trust: 0.8

url:http://code.google.com/android/

Trust: 0.3

url:http://www.qualcomm.com/

Trust: 0.3

url:https://source.android.com/security/bulletin/2019-02-01

Trust: 0.3

sources: VULHUB: VHN-121829 // BID: 106845 // JVNDB: JVNDB-2018-012581 // CNNVD: CNNVD-201811-834 // NVD: CVE-2018-11921

CREDITS

The vendor reported these issues.

Trust: 0.9

sources: BID: 106845 // CNNVD: CNNVD-201811-834

SOURCES

db:VULHUBid:VHN-121829
db:BIDid:106845
db:JVNDBid:JVNDB-2018-012581
db:CNNVDid:CNNVD-201811-834
db:NVDid:CVE-2018-11921

LAST UPDATE DATE

2024-11-23T22:06:20.115000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-121829date:2020-08-24T00:00:00
db:BIDid:106845date:2019-02-04T00:00:00
db:JVNDBid:JVNDB-2018-012581date:2019-02-05T00:00:00
db:CNNVDid:CNNVD-201811-834date:2020-10-23T00:00:00
db:NVDid:CVE-2018-11921date:2024-11-21T03:44:15.357

SOURCES RELEASE DATE

db:VULHUBid:VHN-121829date:2018-11-28T00:00:00
db:BIDid:106845date:2019-02-04T00:00:00
db:JVNDBid:JVNDB-2018-012581date:2019-02-05T00:00:00
db:CNNVDid:CNNVD-201811-834date:2018-11-29T00:00:00
db:NVDid:CVE-2018-11921date:2018-11-28T15:29:00.437