CVE-2018-11277

CVSS V2 Medium 4.6 CVSS V3 High 7.8
Description
In Snapdragon (Automobile, Mobile, Wear) in version MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SDA660, the com.qualcomm.embms is a vendor package deployed in the system image which has an inadequate permission level and allows any application installed from Play Store to request this permission at install-time. The system application interfaces with the Radio Interface Layer leading to potential access control issue.
Overview
  • CVE ID
  • CVE-2018-11277
  • Assigner
  • product-security@qualcomm.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2018-09-20T13:29:01
  • Last Modified Date
  • 2019-10-03T00:03:26
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd212_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd212:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd430_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd430:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd450_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd450:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd615_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd615:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd616_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd616:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd415_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd415:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd617_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd617:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd625_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd625:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd650_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd650:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd652_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd652:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd810_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd810:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd820:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd820a_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd820a:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sd845_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sd845:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:L/AC:L/Au:N/C:P/I:P/A:P
  • Access Vector
  • LOCAL
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 4.6
  • Severity
  • MEDIUM
  • Exploitability Score
  • 3.9
  • Impact Score
  • 6.4
CVSS Version 3
  • Version
  • 3.0
  • Vector String
  • CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • LOCAL
  • Attack Compatibility
  • LOW
  • Privileges Required
  • LOW
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 7.8
  • Base Severity
  • HIGH
  • Exploitability Score
  • 1.8
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
https://www.qualcomm.com/company/product-security/bulletins Vendor Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 17:31:52 Added to TrackCVE
2022-12-03 12:23:27 security.cna@qualcomm.com product-security@qualcomm.com CVE Assigner updated
2022-12-03 12:23:27 2018-09-20T13:29Z 2018-09-20T13:29:01 CVE Published Date updated
2022-12-03 12:23:27 2019-10-03T00:03:26 CVE Modified Date updated
2022-12-03 12:23:27 Analyzed Vulnerability Status updated