First published: Mon Apr 02 2018(Updated: )
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile and Snapdragon Mobile SD 820 and SD 820A, the input to RPMB write response function is a buffer from HLOS that needs to be authenticated (using HMAC) and then processed. However, some of the processing occurs before the buffer is authenticated. The function will return various types of errors depending on the values of the `response` and `result` fields of the buffer before verifying the HMAC tag.
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Google Android | ||
Qualcomm Sd 820a Firmware | ||
Qualcomm Sd 820a | ||
Android |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10434 has a significant impact as it affects the authentication process for RPMB write responses on specific Qualcomm Snapdragon chipsets.
To fix CVE-2016-10434, ensure that your Android device is updated with the latest security patch provided by the manufacturer.
CVE-2016-10434 primarily affects devices using Qualcomm Snapdragon 820 and 820A chipsets running Android prior to the April 2018 security update.
CVE-2016-10434 may allow unauthorized access to sensitive data processed by the RPMB if the vulnerability is exploited.
No, CVE-2016-10434 specifically impacts certain models of Android devices utilizing Qualcomm Snapdragon 820 and 820A hardware.