First published: Fri Oct 26 2018(Updated: )
When FW tries to get random mac address generated from new SW RNG and ADC values read are constant then DUT get struck in loop while trying to get random ADC samples in Snapdragon Mobile in version SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Qualcomm Sd 210 Firmware | ||
Qualcomm Sd 210 | ||
Qualcomm Sd 212 Firmware | ||
Qualcomm Sd 212 | ||
Qualcomm Sd 205 Firmware | ||
Qualcomm Sd 205 | ||
Qualcomm Sd 425 Firmware | ||
Qualcomm Sd 425 | ||
Qualcomm Sd 430 Firmware | ||
Qualcomm Sd 430 | ||
Qualcomm Sd 450 Firmware | ||
Qualcomm Sd 450 | ||
Qualcomm Sd 625 Firmware | ||
Qualcomm Sd 625 | ||
Qualcomm Sd 650 Firmware | ||
Qualcomm Sd 650 | ||
Qualcomm Sd 652 Firmware | ||
Qualcomm Sd 652 | ||
Android |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-11828 is classified as high due to potential denial of service conditions.
To fix CVE-2018-11828, update the affected Qualcomm hardware firmware to a patched version as provided by the manufacturer.
CVE-2018-11828 affects Snapdragon Mobile chipsets including SD 210, SD 212, SD 205, SD 425, SD 430, SD 450, SD 625, SD 650, and SD 652.
The impact of CVE-2018-11828 is that it may cause devices to become unresponsive, resulting in potential denial of service.
Currently, the recommended approach is to apply firmware updates from Qualcomm as there are no known effective workarounds for CVE-2018-11828.