CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
56.1%
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 808, SD 810, SD 820, SD 835, SD 845, SDM630, SDM636, SDM660, SDX20, and Snapdragon_High_Med_2016, the ‘proper’ solution for this will be to ensure that any users of qsee_log in the bootchain (before Linux boots) unallocate their buffers and clear the qsee_log pointer. Until support for that is implemented in TZ and the bootloader, enable tz_log to avoid potential scribbling. This solution will prevent the linux kernel memory corruption.
Vendor | Product | Version | CPE |
---|---|---|---|
qualcomm | sd_210_firmware | - | cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:* |
qualcomm | sd_210 | - | cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:* |
qualcomm | sd_212_firmware | - | cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:* |
qualcomm | sd_212 | - | cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:* |
qualcomm | sd_205_firmware | - | cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:* |
qualcomm | sd_205 | - | cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:* |
qualcomm | sd_410_firmware | - | cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:* |
qualcomm | sd_410 | - | cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:* |
qualcomm | sd_412_firmware | - | cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:* |
qualcomm | sd_412 | - | cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:* |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
56.1%