CVE-2018-5837

In Snapdragon (Automobile, Mobile, Wear) in version IPQ8074, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6574AU, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 820A, SD 835, SD 845, SD 850, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, SDM710, Snapdragon_High_Med_2016, MAC address randomization performed during probe requests is not done properly due to a flawed RNG which produced repeating output much earlier than expected.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:ipq8074:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:qualcomm:sd212_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd212:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:qualcomm:sd425_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd425:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:qualcomm:sd427_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd427:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:qualcomm:sd430_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd430:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:qualcomm:sd435_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd435:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:qualcomm:sd450_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd450:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:qualcomm:sd625_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd625:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:qualcomm:sd820a_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd820a:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
cpe:2.3:o:qualcomm:sd845_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd845:-:*:*:*:*:*:*:*

Configuration 20 (hide)

AND
cpe:2.3:o:qualcomm:sd850_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sd850:-:*:*:*:*:*:*:*

Configuration 21 (hide)

AND
cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*

Configuration 22 (hide)

AND
cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*

Configuration 23 (hide)

AND
cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*

Configuration 24 (hide)

AND
cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*

Configuration 25 (hide)

AND
cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*

Configuration 26 (hide)

AND
cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*

Configuration 27 (hide)

AND
cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*

Configuration 28 (hide)

AND
cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:09

Type Values Removed Values Added
References () https://source.android.com/security/bulletin/2018-07-01#qualcomm-closed-source-components - Vendor Advisory () https://source.android.com/security/bulletin/2018-07-01#qualcomm-closed-source-components - Vendor Advisory
References () https://www.qualcomm.com/company/product-security/bulletins - Vendor Advisory () https://www.qualcomm.com/company/product-security/bulletins - Vendor Advisory

Information

Published : 2018-09-20 13:29

Updated : 2024-11-21 04:09


NVD link : CVE-2018-5837

Mitre link : CVE-2018-5837

CVE.ORG link : CVE-2018-5837


JSON object : View

Products Affected

qualcomm

  • sd430
  • sdm439_firmware
  • qca6574au_firmware
  • sd450
  • mdm9640
  • sdm636
  • sd450_firmware
  • mdm9650
  • ipq8074
  • sd205_firmware
  • sdm710_firmware
  • mdm9607
  • sd425_firmware
  • sd625_firmware
  • sdm660_firmware
  • sda660_firmware
  • mdm9607_firmware
  • qca6574au
  • sd845
  • mdm9206
  • sd430_firmware
  • sdm710
  • sd435_firmware
  • sd425
  • sd845_firmware
  • sdm632_firmware
  • msm8996au
  • mdm9650_firmware
  • mdm9640_firmware
  • sdm429
  • sd835
  • sd427_firmware
  • sd427
  • sd820a
  • sda660
  • sdm439
  • sd435
  • sdm429_firmware
  • mdm9206_firmware
  • sdm630_firmware
  • msm8996au_firmware
  • ipq8074_firmware
  • sd820a_firmware
  • sd212
  • sd835_firmware
  • sd625
  • sd210_firmware
  • sdm636_firmware
  • sdm660
  • sd850_firmware
  • sd210
  • sdm630
  • sd850
  • sdm632
  • sd212_firmware
  • sd205
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)