CWE
20
Advisory Published
CVE Published
Updated

CVE-2019-10538: Input Validation

First published: Mon Aug 05 2019(Updated: )

Lack of check of address range received from firmware response allows modem to respond arbitrary pages into its address range which can compromise HLOS in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MSM8909W, MSM8996AU, QCS405, QCS605, Qualcomm 215, SD 425, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820A, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM660, SDX20, SDX24

Credit: product-security@qualcomm.com

Affected SoftwareAffected VersionHow to fix
Android
Qualcomm 8909 Firmware
Qualcomm Snapdragon 8909
qualcomm MSM8996AU firmware
Qualcomm MSM8996AU Firmware
Qualcomm QCS405 Firmware
Qualcomm QCS405 Firmware
Qualcomm QCS605
Qualcomm QCS605 Firmware
Qualcomm 215 Mobile Firmware
Qualcomm 215 Firmware
Qualcomm SDR425 Firmware
Qualcomm Snapdragon 425
qualcomm SDM439 firmware
Qualcomm PM439
Qualcomm SDA429W Firmware
Qualcomm SD 429 Firmware
Qualcomm SDM450 Firmware
Qualcomm SDM450
Qualcomm SD 625 Firmware
Qualcomm Snapdragon 625
Qualcomm SD632 Firmware
Qualcomm SD 632 firmware
Qualcomm SDM636 Firmware
Qualcomm Snapdragon 636
Qualcomm Snapdragon 665
Qualcomm Snapdragon 665
Qualcomm SD 675 Firmware
Qualcomm Snapdragon 675
Qualcomm Snapdragon 712 Firmware
Qualcomm Snapdragon 712
Qualcomm SD710 Firmware
Qualcomm Snapdragon 710
Qualcomm SD 670
Qualcomm SDM670
Qualcomm SD 730 Firmware
Qualcomm Snapdragon 730
Qualcomm SD820A Firmware
Qualcomm SD820A Firmware
Qualcomm SDA845 Firmware
Qualcomm SD845
Qualcomm SD850 Firmware
Qualcomm SD850
Qualcomm SD855 Firmware
Qualcomm SD855 Firmware
Qualcomm SDA660
Qualcomm SDA660
Qualcomm SDM439 Firmware
Qualcomm SDM439 Firmware
Qualcomm SD660 Firmware
Qualcomm Snapdragon 660
Qualcomm SDX20 Firmware
Qualcomm SDX20 Firmware
Qualcomm SDX24
Qualcomm SDX24

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2019-10538?

    CVE-2019-10538 is a vulnerability that allows a modem to respond arbitrary pages into its address range, compromising the HLOS in various Qualcomm Snapdragon platforms.

  • What software is affected by CVE-2019-10538?

    The affected software includes Qualcomm MSM8909W Firmware, Qualcomm MSM8996AU Firmware, Qualcomm QCS405 Firmware, Qualcomm QCS605 Firmware, Qualcomm Qualcomm 215 Firmware, Qualcomm SD 425 Firmware, Qualcomm SD 439 Firmware, Qualcomm SD 429 Firmware, Qualcomm SD 450 Firmware, Qualcomm SD 625 Firmware, Qualcomm SD 632 Firmware, Qualcomm SD 636 Firmware, Qualcomm SD 665 Firmware, Qualcomm SD 712 Firmware, Qualcomm SD 710 Firmware, Qualcomm SD 670 Firmware, Qualcomm SD 730 Firmware, Qualcomm SD 820a Firmware, Qualcomm SD 845 Firmware, Qualcomm SD 850 Firmware, Qualcomm SD 855 Firmware, Qualcomm SDA660 Firmware, Qualcomm SDM439 Firmware, Qualcomm SDM660 Firmware, and Qualcomm SDX24 Firmware.

  • What is the severity of CVE-2019-10538?

    CVE-2019-10538 has a severity rating of 9.8, which is considered critical.

  • How can CVE-2019-10538 be exploited?

    CVE-2019-10538 can be exploited by an attacker using a firmware response to inject arbitrary pages into the modem's address range.

  • Are there any references available for CVE-2019-10538?

    Yes, you can find references for CVE-2019-10538 at the following links: - [Commit Details](https://source.codeaurora.org/quic/la/kernel/msm-4.9/commit/?id=e0d510ff0fcb0778571579635b53ddd7e4caeb24) - [Android Security Bulletin - August 2019](https://source.android.com/docs/security/bulletin/2019-08-01) - [Code Aurora Security Bulletin - August 2019](https://www.codeaurora.org/security-bulletin/2019/08/05/august-2019-code-aurora-security-bulletin)

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203