First published: Tue Sep 04 2018(Updated: )
While accessing SafeSwitch services, third party can manipulate a given device and perform unauthorized operation due to lack of checking of same state transitions in Snapdragon Automobile, Snapdragon Mobile in version MSM8996AU, SD 410/12, SD 617, SD 650/52, SD 810, SD 820, SD 820A
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
qualcomm MSM8996AU firmware | ||
Qualcomm MSM8996AU Firmware | ||
Qualcomm SD410 Firmware | ||
Qualcomm Snapdragon 410 | ||
Qualcomm SD412 Firmware | ||
Qualcomm SD412 | ||
Qualcomm SD617 Firmware | ||
Qualcomm QCA617 | ||
Qualcomm SD650 Firmware | ||
Qualcomm Snapdragon 650 | ||
Qualcomm SD652 Firmware | ||
Qualcomm SD652 Firmware | ||
Qualcomm Snapdragon 810 Firmware | ||
Qualcomm Snapdragon 810 | ||
Qualcomm SD820 Firmware | ||
Qualcomm SD820 Firmware | ||
Qualcomm SD820A Firmware | ||
Qualcomm SD820A Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-18312 is rated as high due to the potential for unauthorized operations on affected devices.
To fix CVE-2017-18312, ensure your device firmware is updated to include the latest security patches provided by the device manufacturer.
Devices running Qualcomm Snapdragon Mobile and Snapdragon Automobile with versions MSM8996AU, SD 410/12, SD 617, SD 650/52, SD 810, SD 820, and SD 820A are affected by CVE-2017-18312.
Yes, CVE-2017-18312 can be exploited remotely by manipulating the SafeSwitch services on vulnerable devices.
The potential impacts of CVE-2017-18312 include unauthorized access to device functionality and possible compromise of user data.