ID

VAR-201907-0558


CVE

CVE-2019-2241


TITLE

plural Snapdragon Vulnerability related to input validation in products

Trust: 0.8

sources: JVNDB: JVNDB-2019-006896

DESCRIPTION

While rendering the layout background, Error status check is not caught properly and also incorrect status handling is being done leading to unintended SUI behaviour in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in MDM9150, MDM9206, MDM9607, MDM9650, MDM9655, MSM8996AU, QCS404, QCS605, SD 210/SD 212/SD 205, SD 410/12, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM630, SDM660, SDX24, SXR1130. plural Snapdragon The product contains an input validation vulnerability.Information may be tampered with. Qualcomm MDM9206, etc. are all products of Qualcomm. MDM9206 is a central processing unit (CPU) product. MDM9607 is a central processing unit (CPU) product. SDX24 is a modem. There are security vulnerabilities in Content Protection in many Qualcomm products. Attackers can use this vulnerability to perform unauthorized operations. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-129766496, A-129766125, A-122473271, A-122474808, A-122472479, A-122473168, A-122473304, A-122473496, A-122473989, A-129766432, A-129766099 and A-129766299. The following products and versions are affected: Qualcomm MDM9150; MDM9206; MDM9607; MDM9650; MDM9655; MSM8996AU; SD 670; SD 730; SD 820; SD 820A; SD 835; SD 845; SD 850; SD 855; SD 8CX;

Trust: 2.52

sources: NVD: CVE-2019-2241 // JVNDB: JVNDB-2019-006896 // CNVD: CNVD-2020-20157 // BID: 108986 // VULHUB: VHN-153676

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-20157

AFFECTED PRODUCTS

vendor:qualcommmodel:msm8996auscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 8cxscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 410scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdx24scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qcs605scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 205scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 212scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sda660scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 835scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 710scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 675scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 820ascope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9607scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 730scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 850scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm630scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm660scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 845scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 820scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9655scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9150scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 670scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 855scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 412scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sxr1130scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qcs404scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 210scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 712scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 636scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9150scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9206scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9607scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9655scope: - version: -

Trust: 0.8

vendor:qualcommmodel:msm8996auscope: - version: -

Trust: 0.8

vendor:qualcommmodel:qcs404scope: - version: -

Trust: 0.8

vendor:qualcommmodel:qcs605scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 210scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 212scope: - version: -

Trust: 0.8

vendor:qualcommmodel:qcs605 noscope: - version: -

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:425

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:427

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:430

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:435

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:450

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:625

Trust: 0.6

vendor:qualcommmodel:sdscope:eqversion:636

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:712

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:710

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:670

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:845

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:850

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:855

Trust: 0.6

vendor:qualcommmodel:sdm630 noscope: - version: -

Trust: 0.6

vendor:qualcommmodel:sdm660 noscope: - version: -

Trust: 0.6

vendor:qualcommmodel:msm8909w noscope: - version: -

Trust: 0.6

vendor:qualcommmodel:qcs405 noscope: - version: -

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:675

Trust: 0.6

vendor:qualcommmodel:sd noscope:eqversion:730

Trust: 0.6

vendor:qualcommmodel:sdx24 noscope: - version: -

Trust: 0.6

vendor:googlemodel:pixel xlscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixel cscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixelscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexus playerscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:9

Trust: 0.3

vendor:googlemodel:nexus 6pscope: - version: -

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:6

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5x

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2020-20157 // BID: 108986 // JVNDB: JVNDB-2019-006896 // NVD: CVE-2019-2241

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-2241
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-2241
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2020-20157
value: LOW

Trust: 0.6

CNNVD: CNNVD-201907-080
value: MEDIUM

Trust: 0.6

VULHUB: VHN-153676
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2019-2241
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2020-20157
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-153676
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-2241
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2020-20157 // VULHUB: VHN-153676 // JVNDB: JVNDB-2019-006896 // CNNVD: CNNVD-201907-080 // NVD: CVE-2019-2241

PROBLEMTYPE DATA

problemtype:CWE-755

Trust: 1.0

problemtype:CWE-20

Trust: 0.9

sources: VULHUB: VHN-153676 // JVNDB: JVNDB-2019-006896 // NVD: CVE-2019-2241

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201907-080

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201907-080

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-006896

PATCH

title:July 2019 Qualcomm Technologies, Inc. Security Bulletinurl:https://www.qualcomm.com/company/product-security/bulletins

Trust: 0.8

title:Patch for Multiple Qualcomm product input verification error vulnerabilities (CNVD-2020-20157)url:https://www.cnvd.org.cn/patchInfo/show/211557

Trust: 0.6

title:Multiple Qualcomm Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=94314

Trust: 0.6

sources: CNVD: CNVD-2020-20157 // JVNDB: JVNDB-2019-006896 // CNNVD: CNNVD-201907-080

EXTERNAL IDS

db:NVDid:CVE-2019-2241

Trust: 3.4

db:BIDid:108986

Trust: 1.5

db:JVNDBid:JVNDB-2019-006896

Trust: 0.8

db:CNVDid:CNVD-2020-20157

Trust: 0.7

db:CNNVDid:CNNVD-201907-080

Trust: 0.7

db:VULHUBid:VHN-153676

Trust: 0.1

sources: CNVD: CNVD-2020-20157 // VULHUB: VHN-153676 // BID: 108986 // JVNDB: JVNDB-2019-006896 // CNNVD: CNNVD-201907-080 // NVD: CVE-2019-2241

REFERENCES

url:https://www.qualcomm.com/company/product-security/bulletins

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-2241

Trust: 1.4

url:http://www.securityfocus.com/bid/108986

Trust: 1.2

url:http://code.google.com/android/

Trust: 0.9

url:http://www.qualcomm.com/

Trust: 0.9

url:https://source.android.com/security/bulletin/2019-07-01.html

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-2241

Trust: 0.8

url:https://vigilance.fr/vulnerability/google-android-multiple-vulnerabilities-of-july-2019-29673

Trust: 0.6

sources: CNVD: CNVD-2020-20157 // VULHUB: VHN-153676 // BID: 108986 // JVNDB: JVNDB-2019-006896 // CNNVD: CNNVD-201907-080 // NVD: CVE-2019-2241

CREDITS

The vendor reported these issues.

Trust: 0.9

sources: BID: 108986 // CNNVD: CNNVD-201907-080

SOURCES

db:CNVDid:CNVD-2020-20157
db:VULHUBid:VHN-153676
db:BIDid:108986
db:JVNDBid:JVNDB-2019-006896
db:CNNVDid:CNNVD-201907-080
db:NVDid:CVE-2019-2241

LAST UPDATE DATE

2024-11-23T21:37:05.779000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-20157date:2020-03-30T00:00:00
db:VULHUBid:VHN-153676date:2019-07-26T00:00:00
db:BIDid:108986date:2019-07-01T00:00:00
db:JVNDBid:JVNDB-2019-006896date:2019-07-30T00:00:00
db:CNNVDid:CNNVD-201907-080date:2019-07-29T00:00:00
db:NVDid:CVE-2019-2241date:2024-11-21T04:40:30.830

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-20157date:2020-03-30T00:00:00
db:VULHUBid:VHN-153676date:2019-07-25T00:00:00
db:BIDid:108986date:2019-07-01T00:00:00
db:JVNDBid:JVNDB-2019-006896date:2019-07-30T00:00:00
db:CNNVDid:CNNVD-201907-080date:2019-07-02T00:00:00
db:NVDid:CVE-2019-2241date:2019-07-25T17:15:12.347