Buffer Overflow in Snapdragon Mobile and Wear Devices by Qualcomm
CVE-2018-5881
8.8HIGH
Key Information:
- Vendor
- Qualcomm
- Vendor
- CVE Published:
- 18 January 2019
Summary
The vulnerability involves improper validation of buffer length checks within the lwm2m device management protocol, leading to potential buffer overflow issues in various Qualcomm Snapdragon mobile and wearable devices. This oversight can expose devices to security risks, enabling attackers to manipulate memory contents and potentially execute arbitrary code. Users are advised to apply security updates provided by Qualcomm to safeguard their devices.
Affected Version(s)
Snapdragon Mobile, Snapdragon Wear MDM9206, MDM9607, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 835, SDA660, SDM630, SDM660
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved