ID

VAR-201907-1111


CVE

CVE-2018-13896


TITLE

plural Snapdragon Access control vulnerabilities in products

Trust: 0.8

sources: JVNDB: JVNDB-2018-015882

DESCRIPTION

XBL_SEC image authentication and other crypto related validations are accessible to a compromised OEM XBL Loader due to missing lock at XBL_SEC stage.. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in MDM9206, MDM9607, MDM9650, MDM9655, MSM8996AU, QCS404, QCS605, Qualcomm 215, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130. plural Snapdragon The product contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Qualcomm Closed-Source Components are prone to multiple unspecified vulnerabilities. An attacker can exploit these issues to perform unauthorized actions. This may aid in further attacks. These issues are being tracked by Android Bug IDs A-120486477, A-120485121, A-120487163, A-122473494, and A-123998003. Qualcomm MDM9206 is a central processing unit (CPU) product of Qualcomm (Qualcomm). An access control error vulnerability exists in several Qualcomm products. This vulnerability stems from network systems or products not properly restricting access to resources from unauthorized roles

Trust: 2.07

sources: NVD: CVE-2018-13896 // JVNDB: JVNDB-2018-015882 // BID: 108546 // VULHUB: VHN-124001 // VULMON: CVE-2018-13896

AFFECTED PRODUCTS

vendor:qualcommmodel:sd 632scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:msm8996auscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 8cxscope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qcs605scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 427scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sda660scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 636scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 835scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 710scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 425scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 820ascope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 429scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:215scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9607scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:snapdragon high med 2016scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9650scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 850scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm630scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm660scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 845scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 820scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 450scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9655scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sdm439scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 670scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 439scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 435scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 855scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 412scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sxr1130scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:qcs404scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 430scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 712scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 410scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:sd 625scope:eqversion: -

Trust: 1.0

vendor:qualcommmodel:mdm9206scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9607scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9650scope: - version: -

Trust: 0.8

vendor:qualcommmodel:mdm9655scope: - version: -

Trust: 0.8

vendor:qualcommmodel:msm8996auscope: - version: -

Trust: 0.8

vendor:qualcommmodel:qcs404scope: - version: -

Trust: 0.8

vendor:qualcommmodel:qcs605scope: - version: -

Trust: 0.8

vendor:qualcommmodel:215scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 410scope: - version: -

Trust: 0.8

vendor:qualcommmodel:sd 412scope: - version: -

Trust: 0.8

vendor:googlemodel:pixel xlscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixel cscope:eqversion:0

Trust: 0.3

vendor:googlemodel:pixelscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexus playerscope:eqversion:0

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:9

Trust: 0.3

vendor:googlemodel:nexus 6pscope: - version: -

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:6

Trust: 0.3

vendor:googlemodel:nexusscope:eqversion:5x

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:0

Trust: 0.3

sources: BID: 108546 // JVNDB: JVNDB-2018-015882 // NVD: CVE-2018-13896

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-13896
value: HIGH

Trust: 1.0

NVD: CVE-2018-13896
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201906-073
value: HIGH

Trust: 0.6

VULHUB: VHN-124001
value: HIGH

Trust: 0.1

VULMON: CVE-2018-13896
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-13896
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-124001
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-13896
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-124001 // VULMON: CVE-2018-13896 // JVNDB: JVNDB-2018-015882 // CNNVD: CNNVD-201906-073 // NVD: CVE-2018-13896

PROBLEMTYPE DATA

problemtype:CWE-284

Trust: 1.9

sources: VULHUB: VHN-124001 // JVNDB: JVNDB-2018-015882 // NVD: CVE-2018-13896

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201906-073

TYPE

access control error

Trust: 0.6

sources: CNNVD: CNNVD-201906-073

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-015882

PATCH

title:June 2019 Qualcomm Technologies, Inc. Security Bulletinurl:https://www.qualcomm.com/company/product-security/bulletins

Trust: 0.8

title:Multiple Qualcomm Product access control error vulnerability fixesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93162

Trust: 0.6

title:The Registerurl:https://www.theregister.co.uk/2019/06/05/android_june_patch/

Trust: 0.1

sources: VULMON: CVE-2018-13896 // JVNDB: JVNDB-2018-015882 // CNNVD: CNNVD-201906-073

EXTERNAL IDS

db:NVDid:CVE-2018-13896

Trust: 2.9

db:BIDid:108546

Trust: 1.0

db:JVNDBid:JVNDB-2018-015882

Trust: 0.8

db:CNNVDid:CNNVD-201906-073

Trust: 0.7

db:VULHUBid:VHN-124001

Trust: 0.1

db:VULMONid:CVE-2018-13896

Trust: 0.1

sources: VULHUB: VHN-124001 // VULMON: CVE-2018-13896 // BID: 108546 // JVNDB: JVNDB-2018-015882 // CNNVD: CNNVD-201906-073 // NVD: CVE-2018-13896

REFERENCES

url:https://www.qualcomm.com/company/product-security/bulletins

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-13896

Trust: 1.4

url:http://code.google.com/android/

Trust: 0.9

url:http://www.qualcomm.com/

Trust: 0.9

url:https://source.android.com/security/bulletin/2019-06-01.html

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-13896

Trust: 0.8

url:https://www.securityfocus.com/bid/108546

Trust: 0.7

url:https://vigilance.fr/vulnerability/google-android-multiple-vulnerabilities-of-june-2019-29461

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/284.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-124001 // VULMON: CVE-2018-13896 // BID: 108546 // JVNDB: JVNDB-2018-015882 // CNNVD: CNNVD-201906-073 // NVD: CVE-2018-13896

CREDITS

The vendor reported these issues.

Trust: 0.9

sources: BID: 108546 // CNNVD: CNNVD-201906-073

SOURCES

db:VULHUBid:VHN-124001
db:VULMONid:CVE-2018-13896
db:BIDid:108546
db:JVNDBid:JVNDB-2018-015882
db:CNNVDid:CNNVD-201906-073
db:NVDid:CVE-2018-13896

LAST UPDATE DATE

2024-11-23T21:52:06.772000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-124001date:2019-07-25T00:00:00
db:VULMONid:CVE-2018-13896date:2019-07-25T00:00:00
db:BIDid:108546date:2019-06-03T00:00:00
db:JVNDBid:JVNDB-2018-015882date:2019-07-29T00:00:00
db:CNNVDid:CNNVD-201906-073date:2019-07-26T00:00:00
db:NVDid:CVE-2018-13896date:2024-11-21T03:48:16.137

SOURCES RELEASE DATE

db:VULHUBid:VHN-124001date:2019-07-22T00:00:00
db:VULMONid:CVE-2018-13896date:2019-07-22T00:00:00
db:BIDid:108546date:2019-06-03T00:00:00
db:JVNDBid:JVNDB-2018-015882date:2019-07-29T00:00:00
db:CNNVDid:CNNVD-201906-073date:2019-06-03T00:00:00
db:NVDid:CVE-2018-13896date:2019-07-22T14:15:11.080