TROYANOSYVIRUS
Volver a CVEs

CVE-2019-10564

HIGH
7.8

Descripcion

Possible OOB issue in EEPROM due to lack of check while accessing memory map array at the time of reading operation in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8053, MSM8909W, MSM8917, MSM8953, Nicobar, QCS405, QCS605, QM215, SA6155P, SDA845, SDM429, SDM439, SDM450, SDM632, SDM670, SDM710, SDM845, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130

Detalles CVE

Puntuacion CVSS v3.17.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado12/18/2019
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0

Productos afectados

qualcomm:apq8009qualcomm:apq8009_firmwarequalcomm:apq8053qualcomm:apq8053_firmwarequalcomm:msm8909wqualcomm:msm8909w_firmwarequalcomm:msm8917qualcomm:msm8917_firmwarequalcomm:msm8953qualcomm:msm8953_firmwarequalcomm:nicobarqualcomm:nicobar_firmwarequalcomm:qcs405qualcomm:qcs405_firmwarequalcomm:qcs605qualcomm:qcs605_firmwarequalcomm:qm215qualcomm:qm215_firmwarequalcomm:sa6155pqualcomm:sa6155p_firmwarequalcomm:sda845qualcomm:sda845_firmwarequalcomm:sdm429qualcomm:sdm429_firmwarequalcomm:sdm439qualcomm:sdm439_firmwarequalcomm:sdm450qualcomm:sdm450_firmwarequalcomm:sdm632qualcomm:sdm632_firmwarequalcomm:sdm670qualcomm:sdm670_firmwarequalcomm:sdm710qualcomm:sdm710_firmwarequalcomm:sdm845qualcomm:sdm845_firmwarequalcomm:sdx24qualcomm:sdx24_firmwarequalcomm:sdx55qualcomm:sdx55_firmwarequalcomm:sm6150qualcomm:sm6150_firmwarequalcomm:sm7150qualcomm:sm7150_firmwarequalcomm:sm8150qualcomm:sm8150_firmwarequalcomm:sm8250qualcomm:sm8250_firmwarequalcomm:sxr1130qualcomm:sxr1130_firmwarequalcomm:sxr2130qualcomm:sxr2130_firmware

Debilidades (CWE)

CWE-125

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.