First published: Mon Dec 03 2018(Updated: )
AGPS session failure in GNSS module due to cyphersuites are hardcoded and needed manual update everytime in snapdragon mobile and snapdragon wear in versions MDM9635M, MDM9645, MDM9650, MDM9655, MSM8909W, SD 835, SD 845, SD 850
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Qualcomm MDM9635M firmware | ||
Qualcomm MDM9635M | ||
qualcomm mdm9645 firmware | ||
qualcomm mdm9645 | ||
Qualcomm MDM9650 firmware | ||
Qualcomm MDM9650 | ||
Qualcomm MDM9655 firmware | ||
Qualcomm MDM9655 | ||
Qualcomm MSM8909W | ||
Qualcomm MSM8909W | ||
qualcomm SD 835 firmware | ||
qualcomm SD 835 | ||
qualcomm SD 845 firmware | ||
qualcomm SD 845 | ||
qualcomm SD 850 firmware | ||
qualcomm SD 850 | ||
Android |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-18160 has been classified with a medium severity rating due to potential impacts on AGPS session failures.
To fix CVE-2017-18160, manually update the hardcoded cyphersuites in the affected Snapdragon firmware versions.
CVE-2017-18160 affects devices using Snapdragon mobile and wear chipsets, including MDM9635M, MDM9645, MDM9650, MDM9655, MSM8909W, SD 835, SD 845, and SD 850.
CVE-2017-18160 may potentially allow attackers to intercept or manipulate GPS data due to session failures.
Yes, CVE-2017-18160 impacts Google Android systems that utilize the specified Snapdragon chipsets.