Unknown
CVE-2019-10581
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2019-10581
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
NULL is assigned to local instance of audio device pointer after free instead of global static pointer and can lead to use after free issue in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8053, MDM9206, MDM9207C, MDM9607, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8998, Nicobar, QCS605, Rennell, SA6155P, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- apq8009 firmware -,
- apq8053 firmware -,
- mdm9206 firmware -,
- mdm9207c firmware -,
- mdm9607 firmware -,
- msm8909w firmware -,
- msm8917 firmware -,
- msm8920 firmware -,
- msm8937 firmware -,
- msm8940 firmware -,
- msm8998 firmware -,
- nicobar firmware -,
- qcs605 firmware -,
- rennell firmware -,
- sa6155p firmware -,
- sdm630 firmware -,
- sdm636 firmware -,
- sdm660 firmware -,
- sdm670 firmware -,
- sdm710 firmware -,
- sdm845 firmware -,
- sdx24 firmware -,
- sdx55 firmware -,
- sm6150 firmware -,
- sm7150 firmware -,
- sm8150 firmware -,
- sm8250 firmware -,
- sxr2130 firmware -
Weaknesses
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: