First published: Tue Sep 04 2018(Updated: )
While accessing SafeSwitch services, third party can manipulate a given device and perform unauthorized operation due to lack of checking of same state transitions in Snapdragon Automobile, Snapdragon Mobile in version MSM8996AU, SD 410/12, SD 617, SD 650/52, SD 810, SD 820, SD 820A
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Qualcomm MSM8996AU Firmware | ||
Qualcomm MSM8996AU Firmware | ||
qualcomm sd 410 firmware | ||
qualcomm sd 410 | ||
qualcomm sd 412 firmware | ||
qualcomm sd 412 | ||
qualcomm sd 617 firmware | ||
Qualcomm QCA617 | ||
qualcomm sd 650 firmware | ||
qualcomm sd 650 | ||
qualcomm sd 652 firmware | ||
qualcomm sd 652 | ||
qualcomm sd 810 firmware | ||
qualcomm sd 810 | ||
qualcomm SD 820 firmware | ||
qualcomm SD 820 | ||
qualcomm SD 820A firmware | ||
qualcomm SD 820A |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-18312 is rated as high due to the potential for unauthorized operations on affected devices.
To fix CVE-2017-18312, ensure your device firmware is updated to include the latest security patches provided by the device manufacturer.
Devices running Qualcomm Snapdragon Mobile and Snapdragon Automobile with versions MSM8996AU, SD 410/12, SD 617, SD 650/52, SD 810, SD 820, and SD 820A are affected by CVE-2017-18312.
Yes, CVE-2017-18312 can be exploited remotely by manipulating the SafeSwitch services on vulnerable devices.
The potential impacts of CVE-2017-18312 include unauthorized access to device functionality and possible compromise of user data.