ID

VAR-201902-0540


CVE

CVE-2018-11847


TITLE

plural Snapdragon Vulnerability related to input validation in products

Trust: 0.8

sources: JVNDB: JVNDB-2018-014612

DESCRIPTION

Malicious TA can tag QSEE kernel memory and map to EL0, there by corrupting the physical memory as well it can be used to corrupt the QSEE kernel and compromise the whole TEE in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables and Snapdragon Wired Infrastructure and Networking in versions IPQ8074, MDM9206, MDM9607, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCA8081, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 650/52, SD 820, SD 820A, SD 835, SD 8CX, SDM439 and Snapdragon_High_Med_2016. plural Snapdragon The product contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. QualcommIPQ8074 and other are Qualcomm's central processing unit (CPU) products for different platforms. ContentProtection is one of the content protection components. There is an input validation vulnerability in ContentProtection in several Qualcomm products that can be exploited by remote attackers to cause kernel memory to be mapped to EL0. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-111092812, A-111093241 and A-117119136

Trust: 2.52

sources: NVD: CVE-2018-11847 // JVNDB: JVNDB-2018-014612 // CNVD: CNVD-2019-01714 // BID: 106475 // VULMON: CVE-2018-11847

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-01714

AFFECTED PRODUCTS

vendor:qualcommmodel:mdm9206scope: - version: -

Trust: 1.4

vendor:qualcommmodel:mdm9607scope: - version: -

Trust: 1.4

vendor:qualcommmodel:mdm9650scope: - version: -

Trust: 1.4

vendor:qualcommmodel:msm8909wscope: - version: -

Trust: 1.4

vendor:qualcommmodel:msm8996auscope: - version: -

Trust: 1.4

vendor:qualcommmodel:mdm9655scope: - version: -

Trust: 1.4

vendor:qualcommmodel:qca8081scope: - version: -

Trust: 1.4

vendor:qualcommmodel:ipq8074scope: - version: -

Trust: 1.4

vendor:qualcommmodel:sdm439scope: - version: -

Trust: 1.2

vendor:qualcommmodel:sd 632scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:msm8996auscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 8cxscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 415scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 205scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 427scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 212scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 835scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 652scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 425scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 820ascope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 429scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9607scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:snapdragon high med 2016scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 615scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 820scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 450scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:ipq8074scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9655scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 616scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm439scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:msm8909wscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qca8081scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 435scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 439scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 412scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 430scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 210scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 410scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 625scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 210scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 212scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sdscope:eqversion:210

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:212

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:205

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:425

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:450

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:615/16

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:415

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:625

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:650/52

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:820

Trust: 0.6

vendor:qualcommmodel:sd 820ascope: - version: -

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:835

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:430

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:410/12

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:427

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:435

Trust: 0.6

vendor:qualcommmodel:sdm429scope: - version: -

Trust: 0.6

vendor:qualcommmodel:snapdragon high med 2016scope: - version: -

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:632

Trust: 0.6

vendor:qualcommmodel:sd 8cxscope: - version: -

Trust: 0.6

vendor:googlemodel:pixel xlscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixel cscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixelscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexus playerscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:9

Trust: 0.3

vendor:googlemodel:nexus 6pscope: - version: -

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:6

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5x

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2019-01714 // BID: 106475 // JVNDB: JVNDB-2018-014612 // NVD: CVE-2018-11847

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-11847
value: HIGH

Trust: 1.0

NVD: CVE-2018-11847
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-01714
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201901-181
value: HIGH

Trust: 0.6

VULMON: CVE-2018-11847
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-11847
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-01714
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2018-11847
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2019-01714 // VULMON: CVE-2018-11847 // JVNDB: JVNDB-2018-014612 // CNNVD: CNNVD-201901-181 // NVD: CVE-2018-11847

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.8

sources: JVNDB: JVNDB-2018-014612 // NVD: CVE-2018-11847

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201901-181

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201901-181

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-014612

PATCH

title:January 2019 Qualcomm Technologies, Inc. Security Bulletinurl:https://www.qualcomm.com/company/product-security/bulletins

Trust: 0.8

title:Patches for multiple Qualcomm Product Input Validation Vulnerabilities (CNVD-2019-01714)url:https://www.cnvd.org.cn/patchInfo/show/150303

Trust: 0.6

title:Multiple Qualcomm Fixes for product input validation vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=88368

Trust: 0.6

title:Android Security Bulletins: Android Security Bulletin—January 2019url:https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins&qid=6f7705599658e12e11baf07588cec356

Trust: 0.1

title:Threatposturl:https://threatpost.com/google-patches-critical-png-image-bug/141524/

Trust: 0.1

sources: CNVD: CNVD-2019-01714 // VULMON: CVE-2018-11847 // JVNDB: JVNDB-2018-014612 // CNNVD: CNNVD-201901-181

EXTERNAL IDS

db:NVDid:CVE-2018-11847

Trust: 3.4

db:BIDid:106475

Trust: 2.0

db:JVNDBid:JVNDB-2018-014612

Trust: 0.8

db:CNVDid:CNVD-2019-01714

Trust: 0.6

db:CNNVDid:CNNVD-201901-181

Trust: 0.6

db:VULMONid:CVE-2018-11847

Trust: 0.1

sources: CNVD: CNVD-2019-01714 // VULMON: CVE-2018-11847 // BID: 106475 // JVNDB: JVNDB-2018-014612 // CNNVD: CNNVD-201901-181 // NVD: CVE-2018-11847

REFERENCES

url:http://www.securityfocus.com/bid/106475

Trust: 1.7

url:https://www.qualcomm.com/company/product-security/bulletins

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2018-11847

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-11847

Trust: 0.8

url:https://source.android.com/security/bulletin/2019-01-01

Trust: 0.6

url:https://source.android.com/security/bulletin/2019-01-01.html

Trust: 0.4

url:http://code.google.com/android/

Trust: 0.3

url:http://www.qualcomm.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/google-patches-critical-png-image-bug/141524/

Trust: 0.1

sources: CNVD: CNVD-2019-01714 // VULMON: CVE-2018-11847 // BID: 106475 // JVNDB: JVNDB-2018-014612 // CNNVD: CNNVD-201901-181 // NVD: CVE-2018-11847

CREDITS

The vendor reported these issues.

Trust: 0.3

sources: BID: 106475

SOURCES

db:CNVDid:CNVD-2019-01714
db:VULMONid:CVE-2018-11847
db:BIDid:106475
db:JVNDBid:JVNDB-2018-014612
db:CNNVDid:CNNVD-201901-181
db:NVDid:CVE-2018-11847

LAST UPDATE DATE

2024-11-23T21:37:38.844000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-01714date:2019-01-17T00:00:00
db:VULMONid:CVE-2018-11847date:2019-02-21T00:00:00
db:BIDid:106475date:2019-01-07T00:00:00
db:JVNDBid:JVNDB-2018-014612date:2019-03-29T00:00:00
db:CNNVDid:CNNVD-201901-181date:2020-01-08T00:00:00
db:NVDid:CVE-2018-11847date:2024-11-21T03:44:07.437

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-01714date:2019-01-17T00:00:00
db:VULMONid:CVE-2018-11847date:2019-02-11T00:00:00
db:BIDid:106475date:2019-01-07T00:00:00
db:JVNDBid:JVNDB-2018-014612date:2019-03-29T00:00:00
db:CNNVDid:CNNVD-201901-181date:2019-01-09T00:00:00
db:NVDid:CVE-2018-11847date:2019-02-11T15:29:00.240