Bypass of Anti-Rollback in Qualcomm's Snapdragon Products
CVE-2018-3595
5.5MEDIUM
Key Information:
- Vendor
- Qualcomm
- Vendor
- CVE Published:
- 18 January 2019
Summary
This vulnerability involves a flaw in the anti-rollback mechanism in Qualcomm's Snapdragon architecture. Specifically, it can be bypassed during application loading due to inadequate error handling of Replay Protected Memory Block (RPMB) writes. This issue affects multiple Snapdragon products, potentially exposing them to security risks if exploited.
Affected Version(s)
Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear MDM9206, MDM9607, MDM9650, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SDA660, SDX24, SXR1130
References
CVSS V3.1
Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved