First published: Mon Mar 02 2020(Updated: )
Compromised reset handler may bypass access control due to AC config is being reset if debug path is enabled to collect secure or non-secure ram dumps in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8017, APQ8053, APQ8096, APQ8096AU, IPQ6018, MDM9205, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS404, QCS405, QCS605, QM215, Rennell, SA6155P, SC8180X, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130, SXR2130
Credit: product-security@qualcomm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Qualcomm Apq8017 | ||
Qualcomm Apq8053 Firmware | ||
Qualcomm Apq8053 | ||
Qualcomm Apq8096 Firmware | ||
Google Android | ||
Google Android | ||
Google Android | ||
Google Android | ||
Qualcomm Ipq6018 | ||
Google Android | ||
Google Android | ||
Qualcomm Msm8917 Firmware | ||
Qualcomm Msm8917 | ||
Qualcomm Msm8920 Firmware | ||
Qualcomm Msm8920 | ||
Qualcomm Msm8937 Firmware | ||
Google Android | ||
Qualcomm Msm8940 Firmware | ||
Qualcomm Msm8940 | ||
Google Android | ||
Google Android | ||
Qualcomm Msm8996 Firmware | ||
Google Android | ||
Qualcomm Msm8996au Firmware | ||
Qualcomm Msm8996au | ||
Google Android | ||
Qualcomm MSM8998 | ||
Google Android | ||
Qualcomm Nicobar | ||
Qualcomm Qcm2150 Firmware | ||
Google Android | ||
Qualcomm Qcs404 Firmware | ||
Google Android | ||
Qualcomm Qcs405 Firmware | ||
Qualcomm Qcs405 | ||
Qualcomm Qcs605 Firmware | ||
Google Android | ||
Qualcomm Qm215 Firmware | ||
Qualcomm Qm215 | ||
Qualcomm Rennell Firmware | ||
Google Android | ||
Google Android | ||
Qualcomm Sa6155p | ||
Qualcomm Sc8180x Firmware | ||
Qualcomm Sc8180x | ||
Google Android | ||
Google Android | ||
Qualcomm Sda845 Firmware | ||
Qualcomm Sda845 | ||
Google Android | ||
Google Android | ||
Qualcomm Sdm439 Firmware | ||
Qualcomm Sdm439 | ||
Google Android | ||
Qualcomm SDM450 | ||
Qualcomm Sdm630 Firmware | ||
Qualcomm Sdm630 | ||
Qualcomm Sdm632 Firmware | ||
Qualcomm Sdm632 | ||
Google Android | ||
Qualcomm Sdm636 | ||
Qualcomm Sdm660 Firmware | ||
Qualcomm Sdm660 | ||
Qualcomm Sdm670 Firmware | ||
Qualcomm Sdm670 | ||
Qualcomm Sdm710 Firmware | ||
Qualcomm Sdm710 | ||
Qualcomm Sdm845 Firmware | ||
Qualcomm Sdm845 | ||
Qualcomm Sdm850 Firmware | ||
Qualcomm Sdm850 | ||
Qualcomm Sdx24 Firmware | ||
Google Android | ||
Qualcomm Sdx55 Firmware | ||
Qualcomm Sdx55 | ||
Qualcomm Sm6150 Firmware | ||
Qualcomm Sm6150 | ||
Qualcomm Sm7150 Firmware | ||
Qualcomm Sm7150 | ||
Qualcomm Sm8150 Firmware | ||
Qualcomm Sm8150 | ||
Qualcomm Sxr1130 Firmware | ||
Qualcomm Sxr1130 | ||
Qualcomm Sxr2130 Firmware | ||
Qualcomm Sxr2130 | ||
Google Android |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Compromised reset handler may bypass access control due to AC config is being reset if debug path is enabled to collect secure or non-secure ram dumps.
The severity of CVE-2019-14071 is critical with a CVSS score of 7.8.
You can check if you are vulnerable by reviewing the affected software listed in the vulnerability description.
Yes, Google Android is affected by CVE-2019-14071 vulnerability.
You can find more information about CVE-2019-14071 in the references provided.