First published: Fri Oct 26 2018(Updated: )
When FW tries to get random mac address generated from new SW RNG and ADC values read are constant then DUT get struck in loop while trying to get random ADC samples in Snapdragon Mobile in version SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Qualcomm SD210 Firmware | ||
Qualcomm SD 210 Firmware | ||
Qualcomm SD 212 | ||
Qualcomm SD 212 Firmware | ||
Qualcomm 205 Firmware | ||
Qualcomm SD205 Firmware | ||
Qualcomm SDR425 Firmware | ||
Qualcomm Snapdragon 425 | ||
Qualcomm SD 430 Firmware | ||
Qualcomm SD 430 Firmware | ||
Qualcomm SDM450 Firmware | ||
Qualcomm SDM450 | ||
Qualcomm SD 625 Firmware | ||
Qualcomm Snapdragon 625 | ||
Qualcomm SD650 Firmware | ||
Qualcomm Snapdragon 650 | ||
Qualcomm SD652 Firmware | ||
Qualcomm SD652 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-11828 is classified as high due to potential denial of service conditions.
To fix CVE-2018-11828, update the affected Qualcomm hardware firmware to a patched version as provided by the manufacturer.
CVE-2018-11828 affects Snapdragon Mobile chipsets including SD 210, SD 212, SD 205, SD 425, SD 430, SD 450, SD 625, SD 650, and SD 652.
The impact of CVE-2018-11828 is that it may cause devices to become unresponsive, resulting in potential denial of service.
Currently, the recommended approach is to apply firmware updates from Qualcomm as there are no known effective workarounds for CVE-2018-11828.