PT-2020-9078 · Qualcomm · Ipq6018 +34

Published

2020-09-08

·

Updated

2024-09-24

·

CVE-2019-10562

CVSS v2.0
7.2
VectorAV:L/AC:L/Au:N/C:C/I:C/A:C

Name of the Vulnerable Software and Affected Versions:

Qualcomm Snapdragon versions (affected versions not specified)

Description:

The issue is related to improper authentication and signature verification of debug policies in the secure boot loader, which allows unverified debug policies to be loaded into secure memory, leading to memory corruption. This affects various Qualcomm Snapdragon products, including Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, and Snapdragon Wired Infrastructure and Networking, in multiple chipsets such as IPQ6018, Kamorta, MSM8998, Nicobar, QCS404, QCS605, QCS610, Rennell, SA415M, SA6155P, SC7180, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, and SXR2130.

Recommendations:

At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Improper Authentication

Improper Verification of Cryptographic Signature

Weakness Enumeration

Related Identifiers

CVE-2019-10562

Affected Products

Ipq6018
Kamorta
Msm8998
Nicobar
Qcs404
Qcs605
Qcs610
Rennell
Sa415M
Sa6155P
Sc7180
Sda660
Sda845
Sdm630
Sdm636
Sdm660
Sdm670
Sdm710
Sdm845
Sdm850
Sdx24
Sdx55
Sm6150
Sm7150
Sm8150
Sm8250
Sxr1130
Sxr2130
Snapdragon Auto
Snapdragon Compute
Snapdragon Connectivity
Snapdragon Consumer Iot
Snapdragon Industrial Iot
Snapdragon Mobile
Snapdragon Wired Infrastructure/Networking