ID

VAR-201907-0243


CVE

CVE-2019-2346


TITLE

plural Snapdragon Vulnerability related to array index verification in products

Trust: 0.8

sources: JVNDB: JVNDB-2019-007035

DESCRIPTION

Firmware is getting into loop of overwriting memory when scan command is given from host because of improper validation. in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in IPQ8074, QCA8081, QCS404, QCS405, QCS605, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 712 / SD 710 / SD 670, SD 820, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM630, SDM660. plural Snapdragon The product contains a vulnerability related to array index validation.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm SD 712 is a central processing unit (CPU) product of Qualcomm. There are vulnerabilities in input verification errors in WLANs in many Qualcomm products. The vulnerability stems from the fact that the network system or product did not correctly verify the input data. There is currently no detailed vulnerability details provided. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-129766496, A-129766125, A-122473271, A-122474808, A-122472479, A-122473168, A-122473304, A-122473496, A-122473989, A-129766432, A-129766099 and A-129766299

Trust: 2.61

sources: NVD: CVE-2019-2346 // JVNDB: JVNDB-2019-007035 // CNVD: CNVD-2020-20156 // BID: 108986 // VULHUB: VHN-153781 // VULMON: CVE-2019-2346

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-20156

AFFECTED PRODUCTS

vendor:qualcommmodel:sd 8cxscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qcs405scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 427scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qcs605scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sda660scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 835scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 710scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 425scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 850scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm630scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm660scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 845scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 820scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 450scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:ipq8074scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 670scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qca8081scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 435scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 855scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qcs404scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 430scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 712scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 636scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 625scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:ipq8074scope: - version: -

Trust: 0.8

vendor:qualcommmodel:qca8081scope: - version: -

Trust: 0.8

vendor:qualcommmodel:qcs404scope: - version: -

Trust: 0.8

vendor:qualcommmodel:qcs405scope: - version: -

Trust: 0.8

vendor:qualcommmodel:qcs605scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 425scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 427scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 430scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 435scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 450scope: - version: -

Trust: 0.8

vendor:qualcommmodel:qcs404 noscope: - version: -

Trust: 0.6

vendor:qualcommmodel:qcs605 noscope: - version: -

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:425

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:427

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:430

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:435

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:450

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:625

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:636

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:712

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:710

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:670

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:820

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:835

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:845

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:850

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:855

Trust: 0.6

vendor:qualcommmodel:sd 8cx noscope: - version: -

Trust: 0.6

vendor:qualcommmodel:sda660 noscope: - version: -

Trust: 0.6

vendor:qualcommmodel:sdm630 noscope: - version: -

Trust: 0.6

vendor:qualcommmodel:sdm660 noscope: - version: -

Trust: 0.6

vendor:qualcommmodel:ipq8074 noscope: - version: -

Trust: 0.6

vendor:qualcommmodel:qca8081 noscope: - version: -

Trust: 0.6

vendor:qualcommmodel:qcs405 noscope: - version: -

Trust: 0.6

vendor:googlemodel:pixel xlscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixel cscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixelscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexus playerscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:9

Trust: 0.3

vendor:googlemodel:nexus 6pscope: - version: -

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:6

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5x

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2020-20156 // BID: 108986 // JVNDB: JVNDB-2019-007035 // NVD: CVE-2019-2346

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-2346
value: HIGH

Trust: 1.0

NVD: CVE-2019-2346
value: HIGH

Trust: 0.8

CNVD: CNVD-2020-20156
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201907-066
value: HIGH

Trust: 0.6

VULHUB: VHN-153781
value: HIGH

Trust: 0.1

VULMON: CVE-2019-2346
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-2346
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2020-20156
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-153781
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-2346
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2020-20156 // VULHUB: VHN-153781 // VULMON: CVE-2019-2346 // JVNDB: JVNDB-2019-007035 // CNNVD: CNNVD-201907-066 // NVD: CVE-2019-2346

PROBLEMTYPE DATA

problemtype:CWE-129

Trust: 1.9

sources: VULHUB: VHN-153781 // JVNDB: JVNDB-2019-007035 // NVD: CVE-2019-2346

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201907-066

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201907-066

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-007035

PATCH

title:July 2019 Qualcomm Technologies, Inc. Security Bulletinurl:https://www.qualcomm.com/company/product-security/bulletins

Trust: 0.8

title:Patch for Multiple Qualcomm product input verification error vulnerabilities (CNVD-2020-20156)url:https://www.cnvd.org.cn/patchInfo/show/211553

Trust: 0.6

title:Multiple Qualcomm Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=94300

Trust: 0.6

sources: CNVD: CNVD-2020-20156 // JVNDB: JVNDB-2019-007035 // CNNVD: CNNVD-201907-066

EXTERNAL IDS

db:NVDid:CVE-2019-2346

Trust: 3.5

db:BIDid:108986

Trust: 1.6

db:JVNDBid:JVNDB-2019-007035

Trust: 0.8

db:CNVDid:CNVD-2020-20156

Trust: 0.7

db:CNNVDid:CNNVD-201907-066

Trust: 0.7

db:VULHUBid:VHN-153781

Trust: 0.1

db:VULMONid:CVE-2019-2346

Trust: 0.1

sources: CNVD: CNVD-2020-20156 // VULHUB: VHN-153781 // VULMON: CVE-2019-2346 // BID: 108986 // JVNDB: JVNDB-2019-007035 // CNNVD: CNNVD-201907-066 // NVD: CVE-2019-2346

REFERENCES

url:https://www.qualcomm.com/company/product-security/bulletins

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-2346

Trust: 1.4

url:http://www.securityfocus.com/bid/108986

Trust: 1.3

url:http://code.google.com/android/

Trust: 0.9

url:http://www.qualcomm.com/

Trust: 0.9

url:https://source.android.com/security/bulletin/2019-07-01.html

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-2346

Trust: 0.8

url:https://vigilance.fr/vulnerability/google-android-multiple-vulnerabilities-of-july-2019-29673

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/129.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2020-20156 // VULHUB: VHN-153781 // VULMON: CVE-2019-2346 // BID: 108986 // JVNDB: JVNDB-2019-007035 // CNNVD: CNNVD-201907-066 // NVD: CVE-2019-2346

CREDITS

The vendor reported these issues.

Trust: 0.9

sources: BID: 108986 // CNNVD: CNNVD-201907-066

SOURCES

db:CNVDid:CNVD-2020-20156
db:VULHUBid:VHN-153781
db:VULMONid:CVE-2019-2346
db:BIDid:108986
db:JVNDBid:JVNDB-2019-007035
db:CNNVDid:CNNVD-201907-066
db:NVDid:CVE-2019-2346

LAST UPDATE DATE

2024-11-23T21:37:05.708000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-20156date:2020-03-30T00:00:00
db:VULHUBid:VHN-153781date:2019-07-30T00:00:00
db:VULMONid:CVE-2019-2346date:2019-07-30T00:00:00
db:BIDid:108986date:2019-07-01T00:00:00
db:JVNDBid:JVNDB-2019-007035date:2019-07-31T00:00:00
db:CNNVDid:CNNVD-201907-066date:2019-07-31T00:00:00
db:NVDid:CVE-2019-2346date:2024-11-21T04:40:45.683

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-20156date:2020-03-30T00:00:00
db:VULHUBid:VHN-153781date:2019-07-25T00:00:00
db:VULMONid:CVE-2019-2346date:2019-07-25T00:00:00
db:BIDid:108986date:2019-07-01T00:00:00
db:JVNDBid:JVNDB-2019-007035date:2019-07-31T00:00:00
db:CNNVDid:CNNVD-201907-066date:2019-07-02T00:00:00
db:NVDid:CVE-2019-2346date:2019-07-25T17:15:14.237