8.8
CWE
119
Advisory Published
Updated

CVE-2018-5881: Buffer Overflow

First published: Fri Jan 18 2019(Updated: )

Improper validation of buffer length checks in the lwm2m device management protocol can leads to a buffer overflow in snapdragon mobile and snapdragon wear in versions MDM9206, MDM9607, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 835, SDA660, SDM630, SDM660

Credit: product-security@qualcomm.com

Affected SoftwareAffected VersionHow to fix
Qualcomm MDM9206
Qualcomm MDM9206 firmware
Qualcomm MD9607 Firmware
Qualcomm MDM9607 firmware
Qualcomm SD210 Firmware
Qualcomm SD 210 Firmware
Qualcomm SD 212
Qualcomm SD 212 Firmware
Qualcomm 205 Firmware
Qualcomm SD205 Firmware
Qualcomm SDR425 Firmware
Qualcomm Snapdragon 425
Qualcomm SD427 Firmware
Qualcomm SD 427 firmware
Qualcomm SD 430 Firmware
Qualcomm SD 430 Firmware
qualcomm sd435 firmware
Qualcomm Snapdragon 435
Qualcomm SDM450 Firmware
Qualcomm SDM450
Qualcomm SD 625 Firmware
Qualcomm Snapdragon 625
Qualcomm SDM636 Firmware
Qualcomm Snapdragon 636
Qualcomm SD835 Firmware
Qualcomm Snapdragon 835
Qualcomm SDA660
Qualcomm SDA660
Qualcomm SDM630
Qualcomm SDM630 Firmware
Qualcomm SD660 Firmware
Qualcomm Snapdragon 660

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2018-5881?

    CVE-2018-5881 is classified as a high-severity vulnerability due to the potential for buffer overflow leading to exploitation.

  • How do I fix CVE-2018-5881?

    To address CVE-2018-5881, users should apply the latest firmware updates provided by Qualcomm for affected devices.

  • Which devices are affected by CVE-2018-5881?

    CVE-2018-5881 affects various Qualcomm Snapdragon models including MDM9206, MDM9607, and SD series devices.

  • What vulnerabilities are introduced by CVE-2018-5881?

    CVE-2018-5881 may lead to unauthorized access and control over the vulnerable device, compromising user data.

  • Is there a temporary workaround for CVE-2018-5881?

    There are no recommended temporary workarounds for CVE-2018-5881; updating the firmware is the only effective solution.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203