CWE
287
Advisory Published
Updated

CVE-2017-14911

First published: Tue Jan 02 2018(Updated: )

In Android before 2018-01-05 on Qualcomm Snapdragon IoT, Snapdragon Mobile, Snapdragon Automobile APQ8096AU, MDM9206, MDM9650, MSM8996AU, SD 210/SD 212/SD 205, SD 425, SD 430, SD 625, SD 650/52, SD 820, SD 835, it is possible for the XBL loader to skip the authentication of device config.

Credit: product-security@qualcomm.com

Affected SoftwareAffected VersionHow to fix
Android
Qualcomm MDM9206
Qualcomm MDM9206 firmware
Qualcomm APQ8096AU Firmware
Qualcomm APQ8096AU Firmware
qualcomm MSM8996AU firmware
Qualcomm MSM8996AU Firmware
Qualcomm MDM9650
Qualcomm MDM9650 firmware
Qualcomm SD210 Firmware
Qualcomm SD 210 Firmware
Qualcomm SD 212
Qualcomm SD 212 Firmware
Qualcomm 205 Firmware
Qualcomm SD205 Firmware
Qualcomm SDR425 Firmware
Qualcomm Snapdragon 425
Qualcomm SD 430 Firmware
Qualcomm SD 430 Firmware
Qualcomm SD 625 Firmware
Qualcomm Snapdragon 625
Qualcomm SD650 Firmware
Qualcomm Snapdragon 650
Qualcomm SD652 Firmware
Qualcomm SD652 Firmware
Qualcomm SD820 Firmware
Qualcomm SD820 Firmware
Qualcomm SD835 Firmware
Qualcomm Snapdragon 835

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2017-14911?

    CVE-2017-14911 has a high severity rating due to its potential impacts on device security.

  • How do I fix CVE-2017-14911?

    To fix CVE-2017-14911, ensure that your device has been updated to the latest security patch released after January 2018.

  • What devices are affected by CVE-2017-14911?

    CVE-2017-14911 affects various Qualcomm Snapdragon IoT, Mobile, and Automobile platforms including models like APQ8096AU and MSM8996AU.

  • What types of vulnerabilities does CVE-2017-14911 involve?

    CVE-2017-14911 involves the bypassing of authentication mechanisms, which may allow unauthorized configuration changes.

  • Is there a workaround for CVE-2017-14911?

    Currently, the best approach for CVE-2017-14911 is to apply the security updates provided by device manufacturers.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203