Bypass of Anti-Rollback in Qualcomm's Snapdragon Products
CVE-2018-3595

5.5MEDIUM

Key Information:

Vendor
Qualcomm
Vendor
CVE Published:
18 January 2019

Summary

This vulnerability involves a flaw in the anti-rollback mechanism in Qualcomm's Snapdragon architecture. Specifically, it can be bypassed during application loading due to inadequate error handling of Replay Protected Memory Block (RPMB) writes. This issue affects multiple Snapdragon products, potentially exposing them to security risks if exploited.

Affected Version(s)

Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear MDM9206, MDM9607, MDM9650, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SDA660, SDX24, SXR1130

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.