First published: Mon Apr 02 2018(Updated: )
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile and Snapdragon Mobile SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 820, and SD 820A, when a Trusted Application has opened the SPI interface to a particular device, it is possible for another Trusted Application to read the data on this open interface due to non-exclusive access of the SPI bus.
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Qualcomm Sd 425 Firmware | ||
Qualcomm Sd 425 | ||
Qualcomm Sd 430 Firmware | ||
Qualcomm Sd 430 | ||
Qualcomm Sd 450 Firmware | ||
Qualcomm Sd 450 | ||
Qualcomm Sd 625 Firmware | ||
Qualcomm Sd 625 | ||
Qualcomm Sd 650 Firmware | ||
Qualcomm Sd 650 | ||
Qualcomm Sd 652 Firmware | ||
Qualcomm Sd 652 | ||
Qualcomm Sd 820 Firmware | ||
Qualcomm Sd 820 | ||
Qualcomm Sd 820a Firmware | ||
Qualcomm Sd 820a | ||
Android |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-10423 is classified as critical due to the potential for unauthorized access to sensitive information.
To remediate CVE-2016-10423, update your Qualcomm Snapdragon firmware to the latest security patch level available post-April 2018.
CVE-2016-10423 affects various Qualcomm Snapdragon models, including the SD 425, SD 430, SD 450, SD 625, SD 650, SD 652, and SD 820/820a.
Trusted Applications using the SPI interface are at risk with CVE-2016-10423 due to potential privilege escalation vulnerabilities.
A temporary workaround for CVE-2016-10423 involves limiting access to the SPI interface for all applications whenever possible.