CVE-2019-10562

u'Improper authentication and signature verification of debug polices in secure boot loader will allow unverified debug policies to be loaded into secure memory and leads to memory corruption' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in IPQ6018, Kamorta, MSM8998, Nicobar, QCS404, QCS605, QCS610, Rennell, SA415M, SA6155P, SC7180, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:qualcomm:kamorta_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:kamorta:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:qualcomm:msm8998_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:msm8998:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:nicobar:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:qualcomm:qcs404_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qcs404:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:qualcomm:sa415m_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sa415m:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:qualcomm:sc7180_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sc7180:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*

Configuration 20 (hide)

AND
cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*

Configuration 21 (hide)

AND
cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*

Configuration 22 (hide)

AND
cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*

Configuration 23 (hide)

AND
cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*

Configuration 24 (hide)

AND
cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*

Configuration 25 (hide)

AND
cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*

Configuration 26 (hide)

AND
cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*

Configuration 27 (hide)

AND
cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*

Configuration 28 (hide)

AND
cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:19

Type Values Removed Values Added
References () https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin - Broken Link () https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin - Broken Link

Information

Published : 2020-09-08 10:15

Updated : 2024-11-21 04:19


NVD link : CVE-2019-10562

Mitre link : CVE-2019-10562

CVE.ORG link : CVE-2019-10562


JSON object : View

Products Affected

qualcomm

  • sa6155p
  • sxr1130
  • sm6150_firmware
  • qcs605_firmware
  • sdm636
  • sdm845_firmware
  • qcs404
  • nicobar
  • sdm710_firmware
  • sm8150
  • sc7180_firmware
  • sdx55
  • sm7150_firmware
  • sdm660_firmware
  • sda660_firmware
  • qcs610
  • sm8250
  • sdx55_firmware
  • qcs610_firmware
  • sdm710
  • sdm670_firmware
  • sa6155p_firmware
  • qcs605
  • sm6150
  • sda845
  • sxr2130
  • sdm850
  • sdm845
  • ipq6018_firmware
  • sda660
  • sdx24
  • sm7150
  • sdm630_firmware
  • kamorta_firmware
  • sxr1130_firmware
  • qcs404_firmware
  • sdm850_firmware
  • sm8150_firmware
  • sm8250_firmware
  • kamorta
  • sdm660
  • nicobar_firmware
  • ipq6018
  • sdx24_firmware
  • msm8998
  • sxr2130_firmware
  • sa415m_firmware
  • msm8998_firmware
  • sdm670
  • sda845_firmware
  • rennell_firmware
  • sdm630
  • sdm636_firmware
  • sc7180
  • rennell
  • sa415m
CWE
CWE-287

Improper Authentication

CWE-347

Improper Verification of Cryptographic Signature